Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
116.202.104.208 attackspambots
" "
2019-06-27 17:43:22
116.202.104.96 attackbotsspam
Scanning and Vuln Attempts
2019-06-26 20:24:42
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.202.104.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7365
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.202.104.129.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031603 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 17 06:38:24 CST 2022
;; MSG SIZE  rcvd: 108
Host info
129.104.202.116.in-addr.arpa domain name pointer static.129.104.202.116.clients.your-server.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
129.104.202.116.in-addr.arpa	name = static.129.104.202.116.clients.your-server.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.249.250.209 attackspam
Unauthorized SSH login attempts
2020-01-10 14:12:33
222.186.175.148 attack
Jan 10 07:03:01 dedicated sshd[9000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
Jan 10 07:03:03 dedicated sshd[9000]: Failed password for root from 222.186.175.148 port 39782 ssh2
2020-01-10 14:04:47
58.96.198.15 attackbots
SSH/22 MH Probe, BF, Hack -
2020-01-10 14:07:30
125.160.66.115 attackspambots
1578632164 - 01/10/2020 05:56:04 Host: 125.160.66.115/125.160.66.115 Port: 445 TCP Blocked
2020-01-10 14:43:27
222.186.180.130 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
Failed password for root from 222.186.180.130 port 64033 ssh2
Failed password for root from 222.186.180.130 port 64033 ssh2
Failed password for root from 222.186.180.130 port 64033 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
2020-01-10 14:26:44
123.206.255.181 attackspambots
SSH Login Bruteforce
2020-01-10 14:23:52
68.113.154.83 attack
Automatic report - Port Scan Attack
2020-01-10 14:18:52
203.177.1.108 attack
Jan 10 06:34:59 lnxweb61 sshd[16034]: Failed password for root from 203.177.1.108 port 47626 ssh2
Jan 10 06:34:59 lnxweb61 sshd[16034]: Failed password for root from 203.177.1.108 port 47626 ssh2
2020-01-10 14:03:49
109.236.53.65 attackspambots
B: Magento admin pass test (wrong country)
2020-01-10 14:04:13
81.18.56.10 attack
" "
2020-01-10 14:47:51
210.212.97.243 attackbots
Unauthorized connection attempt detected from IP address 210.212.97.243 to port 445
2020-01-10 13:54:32
95.110.227.64 attackspambots
failed root login
2020-01-10 14:13:37
49.88.112.116 attack
Jan 10 07:01:11 localhost sshd\[25151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.116  user=root
Jan 10 07:01:14 localhost sshd\[25151\]: Failed password for root from 49.88.112.116 port 12661 ssh2
Jan 10 07:01:16 localhost sshd\[25151\]: Failed password for root from 49.88.112.116 port 12661 ssh2
2020-01-10 14:27:46
222.186.15.158 attackspam
01/10/2020-01:14:51.229626 222.186.15.158 Protocol: 6 ET SCAN Potential SSH Scan
2020-01-10 14:18:10
54.38.36.210 attackspam
Jan 10 06:57:17 SilenceServices sshd[21062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.36.210
Jan 10 06:57:20 SilenceServices sshd[21062]: Failed password for invalid user kido from 54.38.36.210 port 54354 ssh2
Jan 10 06:59:08 SilenceServices sshd[22450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.36.210
2020-01-10 14:08:12

Recently Reported IPs

116.202.100.33 116.202.104.254 116.202.106.160 152.39.10.252
26.83.85.180 0.4.88.251 244.155.119.119 73.29.164.26
65.123.218.184 181.88.25.12 4.7.177.53 243.158.202.53
21.95.141.187 99.207.53.129 131.225.206.37 117.151.94.4
37.70.78.210 72.79.198.23 155.65.64.217 45.227.62.32