Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.129.250.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28177
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.129.250.85.			IN	A

;; AUTHORITY SECTION:
.			580	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 15:46:54 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 85.250.129.102.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 85.250.129.102.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
66.249.66.95 attack
Automatic report - Banned IP Access
2019-09-25 12:42:24
167.99.194.54 attackbots
Sep 24 18:38:59 kapalua sshd\[21639\]: Invalid user 1234 from 167.99.194.54
Sep 24 18:38:59 kapalua sshd\[21639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.194.54
Sep 24 18:39:00 kapalua sshd\[21639\]: Failed password for invalid user 1234 from 167.99.194.54 port 39540 ssh2
Sep 24 18:42:51 kapalua sshd\[22141\]: Invalid user upload123 from 167.99.194.54
Sep 24 18:42:51 kapalua sshd\[22141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.194.54
2019-09-25 12:45:35
221.178.157.244 attackspam
Sep 25 03:55:59 work-partkepr sshd\[8484\]: Invalid user vowell from 221.178.157.244 port 16929
Sep 25 03:55:59 work-partkepr sshd\[8484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.178.157.244
...
2019-09-25 12:32:35
103.218.241.91 attackspambots
Sep 25 06:57:35 [host] sshd[19474]: Invalid user cacat from 103.218.241.91
Sep 25 06:57:35 [host] sshd[19474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.218.241.91
Sep 25 06:57:37 [host] sshd[19474]: Failed password for invalid user cacat from 103.218.241.91 port 46884 ssh2
2019-09-25 13:19:17
80.151.229.8 attackspambots
Sep 25 07:50:36 server sshd\[18872\]: Invalid user elliott from 80.151.229.8 port 24759
Sep 25 07:50:36 server sshd\[18872\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.151.229.8
Sep 25 07:50:38 server sshd\[18872\]: Failed password for invalid user elliott from 80.151.229.8 port 24759 ssh2
Sep 25 07:54:32 server sshd\[22333\]: Invalid user wz from 80.151.229.8 port 30074
Sep 25 07:54:32 server sshd\[22333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.151.229.8
2019-09-25 13:14:37
175.6.23.60 attack
Sep 25 06:33:07 lnxded63 sshd[29755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.23.60
Sep 25 06:33:07 lnxded63 sshd[29755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.23.60
2019-09-25 12:50:16
212.59.186.62 attackbots
Scanning and Vuln Attempts
2019-09-25 12:51:25
202.164.48.202 attack
Sep 25 07:38:13 server sshd\[25924\]: Invalid user petru from 202.164.48.202 port 58339
Sep 25 07:38:13 server sshd\[25924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.164.48.202
Sep 25 07:38:15 server sshd\[25924\]: Failed password for invalid user petru from 202.164.48.202 port 58339 ssh2
Sep 25 07:42:48 server sshd\[8332\]: Invalid user sueko from 202.164.48.202 port 50233
Sep 25 07:42:48 server sshd\[8332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.164.48.202
2019-09-25 13:04:41
148.70.35.109 attackbots
Sep 25 06:57:43 nextcloud sshd\[11817\]: Invalid user wasadrc from 148.70.35.109
Sep 25 06:57:43 nextcloud sshd\[11817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.35.109
Sep 25 06:57:45 nextcloud sshd\[11817\]: Failed password for invalid user wasadrc from 148.70.35.109 port 42784 ssh2
...
2019-09-25 12:58:45
186.84.174.215 attackbotsspam
Sep 25 06:39:15 dedicated sshd[13679]: Invalid user tester from 186.84.174.215 port 45729
2019-09-25 13:00:25
103.21.218.242 attack
F2B jail: sshd. Time: 2019-09-25 06:45:23, Reported by: VKReport
2019-09-25 12:48:52
218.92.0.182 attack
Sep 25 00:40:35 xtremcommunity sshd\[448467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.182  user=root
Sep 25 00:40:37 xtremcommunity sshd\[448467\]: Failed password for root from 218.92.0.182 port 33851 ssh2
Sep 25 00:40:40 xtremcommunity sshd\[448467\]: Failed password for root from 218.92.0.182 port 33851 ssh2
Sep 25 00:40:42 xtremcommunity sshd\[448467\]: Failed password for root from 218.92.0.182 port 33851 ssh2
Sep 25 00:40:45 xtremcommunity sshd\[448467\]: Failed password for root from 218.92.0.182 port 33851 ssh2
...
2019-09-25 13:12:51
104.42.25.12 attack
2019-09-25T04:56:54.870059abusebot-3.cloudsearch.cf sshd\[22656\]: Invalid user ubuntu from 104.42.25.12 port 6336
2019-09-25 13:20:43
106.13.147.69 attackbotsspam
Sep 25 07:15:54 s64-1 sshd[16968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.147.69
Sep 25 07:15:56 s64-1 sshd[16968]: Failed password for invalid user admin from 106.13.147.69 port 48372 ssh2
Sep 25 07:21:31 s64-1 sshd[17068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.147.69
...
2019-09-25 13:25:15
51.89.164.224 attackspambots
2019-09-25T05:51:55.183535  sshd[25306]: Invalid user testing1 from 51.89.164.224 port 36255
2019-09-25T05:51:55.197875  sshd[25306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.164.224
2019-09-25T05:51:55.183535  sshd[25306]: Invalid user testing1 from 51.89.164.224 port 36255
2019-09-25T05:51:57.373990  sshd[25306]: Failed password for invalid user testing1 from 51.89.164.224 port 36255 ssh2
2019-09-25T05:55:47.001427  sshd[25362]: Invalid user oz from 51.89.164.224 port 56816
...
2019-09-25 12:43:16

Recently Reported IPs

102.129.250.80 102.129.250.90 102.129.250.89 102.129.250.93
1.0.232.90 102.129.252.108 102.129.250.97 102.129.252.101
102.129.250.94 102.129.252.105 102.129.252.103 1.0.232.98
102.129.252.116 102.129.252.120 102.129.252.133 102.129.252.119
102.129.252.125 102.129.252.138 102.129.252.150 102.129.252.149