Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.129.63.114 proxy
VPN fraud
2023-03-24 13:59:17
104.129.63.120 attackbotsspam
Automatic report - Banned IP Access
2019-09-11 08:35:15
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.129.63.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57027
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.129.63.142.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023072703 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 28 07:02:39 CST 2023
;; MSG SIZE  rcvd: 107
Host info
142.63.129.104.in-addr.arpa domain name pointer unassigned.quadranet.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.63.129.104.in-addr.arpa	name = unassigned.quadranet.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
117.50.14.123 attackbots
Lines containing failures of 117.50.14.123
Sep 12 19:18:02 shared07 sshd[4543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.14.123  user=r.r
Sep 12 19:18:03 shared07 sshd[4543]: Failed password for r.r from 117.50.14.123 port 45626 ssh2
Sep 12 19:18:04 shared07 sshd[4543]: Received disconnect from 117.50.14.123 port 45626:11: Bye Bye [preauth]
Sep 12 19:18:04 shared07 sshd[4543]: Disconnected from authenticating user r.r 117.50.14.123 port 45626 [preauth]
Sep 12 19:31:06 shared07 sshd[9557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.14.123  user=r.r
Sep 12 19:31:08 shared07 sshd[9557]: Failed password for r.r from 117.50.14.123 port 58638 ssh2
Sep 12 19:31:08 shared07 sshd[9557]: Received disconnect from 117.50.14.123 port 58638:11: Bye Bye [preauth]
Sep 12 19:31:08 shared07 sshd[9557]: Disconnected from authenticating user r.r 117.50.14.123 port 58638 [preauth]
Sep 12........
------------------------------
2020-09-14 05:50:16
187.53.116.185 attackbotsspam
Sep 13 21:30:09 django-0 sshd[18576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187-53-116-185.user3p.brasiltelecom.net.br  user=root
Sep 13 21:30:10 django-0 sshd[18576]: Failed password for root from 187.53.116.185 port 55402 ssh2
...
2020-09-14 05:52:58
40.68.154.237 attackspam
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-09-14 06:16:17
210.14.77.102 attackspambots
Sep 13 23:17:19 mout sshd[31209]: Invalid user phpmyadmin from 210.14.77.102 port 57779
Sep 13 23:17:21 mout sshd[31209]: Failed password for invalid user phpmyadmin from 210.14.77.102 port 57779 ssh2
Sep 13 23:17:21 mout sshd[31209]: Disconnected from invalid user phpmyadmin 210.14.77.102 port 57779 [preauth]
2020-09-14 05:59:18
197.5.145.68 attackbotsspam
Banned for a week because repeated abuses, for example SSH, but not only
2020-09-14 06:14:31
138.68.253.149 attackspambots
Sep 13 21:36:24 ip-172-31-16-56 sshd\[14588\]: Failed password for root from 138.68.253.149 port 39628 ssh2\
Sep 13 21:38:45 ip-172-31-16-56 sshd\[14612\]: Failed password for root from 138.68.253.149 port 53224 ssh2\
Sep 13 21:41:10 ip-172-31-16-56 sshd\[14723\]: Failed password for root from 138.68.253.149 port 38588 ssh2\
Sep 13 21:43:30 ip-172-31-16-56 sshd\[14750\]: Invalid user koeso from 138.68.253.149\
Sep 13 21:43:31 ip-172-31-16-56 sshd\[14750\]: Failed password for invalid user koeso from 138.68.253.149 port 52192 ssh2\
2020-09-14 05:57:38
178.33.212.220 attack
firewall-block, port(s): 9919/tcp
2020-09-14 05:54:43
59.177.78.90 attackbotsspam
Unauthorised access (Sep 13) SRC=59.177.78.90 LEN=40 TTL=50 ID=51748 TCP DPT=23 WINDOW=48002 SYN
2020-09-14 06:21:58
43.251.37.21 attackspam
Sep 13 21:53:42 instance-2 sshd[16209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.251.37.21 
Sep 13 21:53:44 instance-2 sshd[16209]: Failed password for invalid user rust from 43.251.37.21 port 40977 ssh2
Sep 13 21:58:23 instance-2 sshd[16342]: Failed password for root from 43.251.37.21 port 45336 ssh2
2020-09-14 06:09:52
183.239.21.44 attackbots
Sep 13 20:56:28 prox sshd[15980]: Failed password for root from 183.239.21.44 port 40039 ssh2
2020-09-14 05:59:39
94.142.241.194 attackspam
Automatic report - Banned IP Access
2020-09-14 05:53:27
64.71.131.100 attackspambots
Invalid user testman from 64.71.131.100 port 38436
2020-09-14 06:17:13
117.69.188.17 attackspam
Sep 13 20:36:33 srv01 postfix/smtpd\[8700\]: warning: unknown\[117.69.188.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 13 20:39:59 srv01 postfix/smtpd\[23344\]: warning: unknown\[117.69.188.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 13 20:43:25 srv01 postfix/smtpd\[15615\]: warning: unknown\[117.69.188.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 13 20:46:51 srv01 postfix/smtpd\[15615\]: warning: unknown\[117.69.188.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 13 20:50:17 srv01 postfix/smtpd\[14316\]: warning: unknown\[117.69.188.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-14 05:44:24
5.188.116.52 attackbotsspam
Sep 13 23:38:42 ns381471 sshd[30819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.188.116.52
Sep 13 23:38:44 ns381471 sshd[30819]: Failed password for invalid user kenneth11 from 5.188.116.52 port 59586 ssh2
2020-09-14 05:46:56
194.180.224.130 attackbotsspam
Multiple SSH login attempts.
2020-09-14 06:03:24

Recently Reported IPs

2a02:8108:84c0:124c:20d6:8ecb:81e5:b720 52.139.235.169 62.37.30.87 222.92.9.238
70.94.66.14 2.66.35.78 58.212.22.191 189.37.67.86
88.25.102.26 85.205.110.133 190.229.205.22 8.68.24.25
212.207.62.109 231.39.59.141 64.20.37.190 115.76.51.97
141.98.234.32 91.243.81.40 18.154.132.95 42.200.78.42