Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
116.202.104.208 attackspambots
" "
2019-06-27 17:43:22
116.202.104.96 attackbotsspam
Scanning and Vuln Attempts
2019-06-26 20:24:42
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.202.104.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7365
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.202.104.129.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031603 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 17 06:38:24 CST 2022
;; MSG SIZE  rcvd: 108
Host info
129.104.202.116.in-addr.arpa domain name pointer static.129.104.202.116.clients.your-server.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
129.104.202.116.in-addr.arpa	name = static.129.104.202.116.clients.your-server.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
142.93.2.104 attackbots
 TCP (SYN) 142.93.2.104:44651 -> port 22, len 44
2020-07-27 16:28:40
49.232.165.242 attack
Jul 27 06:52:12 scw-6657dc sshd[3923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.165.242
Jul 27 06:52:12 scw-6657dc sshd[3923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.165.242
Jul 27 06:52:13 scw-6657dc sshd[3923]: Failed password for invalid user adam from 49.232.165.242 port 38414 ssh2
...
2020-07-27 17:04:21
154.113.1.142 attackspam
(sshd) Failed SSH login from 154.113.1.142 (NG/Nigeria/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 27 09:57:16 amsweb01 sshd[16554]: Invalid user igor from 154.113.1.142 port 2408
Jul 27 09:57:19 amsweb01 sshd[16554]: Failed password for invalid user igor from 154.113.1.142 port 2408 ssh2
Jul 27 10:11:40 amsweb01 sshd[18576]: Invalid user ubuntu from 154.113.1.142 port 12746
Jul 27 10:11:42 amsweb01 sshd[18576]: Failed password for invalid user ubuntu from 154.113.1.142 port 12746 ssh2
Jul 27 10:16:13 amsweb01 sshd[19228]: Invalid user test from 154.113.1.142 port 9180
2020-07-27 17:02:32
51.91.100.120 attackbots
" "
2020-07-27 16:38:37
171.244.139.178 attack
Failed password for invalid user olt from 171.244.139.178 port 6104 ssh2
2020-07-27 16:40:37
129.28.77.179 attackbots
Jul 27 03:51:16 ws26vmsma01 sshd[180044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.77.179
Jul 27 03:51:18 ws26vmsma01 sshd[180044]: Failed password for invalid user zhangbo from 129.28.77.179 port 48874 ssh2
...
2020-07-27 17:03:54
146.185.145.222 attackspam
*Port Scan* detected from 146.185.145.222 (NL/Netherlands/North Holland/Amsterdam-Zuidoost/-). 4 hits in the last 85 seconds
2020-07-27 16:37:27
54.38.70.93 attackbotsspam
Jul 26 22:36:10 web9 sshd\[14993\]: Invalid user loredana from 54.38.70.93
Jul 26 22:36:10 web9 sshd\[14993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.70.93
Jul 26 22:36:12 web9 sshd\[14993\]: Failed password for invalid user loredana from 54.38.70.93 port 43142 ssh2
Jul 26 22:39:59 web9 sshd\[15474\]: Invalid user follett from 54.38.70.93
Jul 26 22:39:59 web9 sshd\[15474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.70.93
2020-07-27 16:48:01
106.12.192.204 attackspambots
Invalid user rosa from 106.12.192.204 port 48688
2020-07-27 16:51:37
77.109.173.12 attackbotsspam
Jul 27 03:47:45 jumpserver sshd[262236]: Invalid user tpuser from 77.109.173.12 port 53008
Jul 27 03:47:47 jumpserver sshd[262236]: Failed password for invalid user tpuser from 77.109.173.12 port 53008 ssh2
Jul 27 03:51:45 jumpserver sshd[262295]: Invalid user admin from 77.109.173.12 port 36384
...
2020-07-27 16:38:11
201.77.146.254 attackbots
wp BF attempts
2020-07-27 16:32:14
46.41.134.9 attack
 TCP (SYN) 46.41.134.9:58146 -> port 22, len 44
2020-07-27 17:05:19
138.68.40.92 attack
SIP/5060 Probe, BF, Hack -
2020-07-27 17:05:42
113.119.199.97 attackbots
Jul 27 06:57:02 buvik sshd[13898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.119.199.97
Jul 27 06:57:04 buvik sshd[13898]: Failed password for invalid user customer1 from 113.119.199.97 port 5600 ssh2
Jul 27 06:58:07 buvik sshd[14040]: Invalid user humberto from 113.119.199.97
...
2020-07-27 17:00:04
118.25.141.194 attackspam
frenzy
2020-07-27 17:01:12

Recently Reported IPs

116.202.100.33 116.202.104.254 116.202.106.160 152.39.10.252
26.83.85.180 0.4.88.251 244.155.119.119 73.29.164.26
65.123.218.184 181.88.25.12 4.7.177.53 243.158.202.53
21.95.141.187 99.207.53.129 131.225.206.37 117.151.94.4
37.70.78.210 72.79.198.23 155.65.64.217 45.227.62.32