Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: University of Texas at Arlington

Hostname: unknown

Organization: unknown

Usage Type: University/College/School

Comments:
Type Details Datetime
attackbotsspam
Mar  5 15:28:49 dillonfme sshd\[25504\]: Invalid user z from 129.107.35.245 port 50494
Mar  5 15:28:49 dillonfme sshd\[25504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.107.35.245
Mar  5 15:28:51 dillonfme sshd\[25504\]: Failed password for invalid user z from 129.107.35.245 port 50494 ssh2
Mar  5 15:33:05 dillonfme sshd\[25697\]: Invalid user a from 129.107.35.245 port 47214
Mar  5 15:33:05 dillonfme sshd\[25697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.107.35.245
...
2019-12-24 06:43:06
attackspambots
Mar  4 21:37:44 motanud sshd\[18114\]: Invalid user levi from 129.107.35.245 port 48184
Mar  4 21:37:44 motanud sshd\[18114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.107.35.245
Mar  4 21:37:46 motanud sshd\[18114\]: Failed password for invalid user levi from 129.107.35.245 port 48184 ssh2
2019-08-04 15:49:24
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.107.35.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32425
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;129.107.35.245.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080400 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Aug 04 15:49:11 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 245.35.107.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 245.35.107.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
171.97.109.158 attackspambots
Invalid user pi from 171.97.109.158 port 57056
2020-05-23 12:12:34
49.247.134.133 attackbots
Invalid user mlg from 49.247.134.133 port 47566
2020-05-23 12:30:40
129.146.46.134 attackspam
May 23 06:15:14 h2829583 sshd[23056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.46.134
2020-05-23 12:16:56
125.161.128.232 attackspambots
Invalid user administrator from 125.161.128.232 port 28984
2020-05-23 12:17:11
190.32.21.250 attackspam
Invalid user eup from 190.32.21.250 port 34270
2020-05-23 12:07:50
222.73.201.96 attack
Invalid user zik from 222.73.201.96 port 44841
2020-05-23 12:01:57
106.13.68.190 attackbots
Invalid user vde from 106.13.68.190 port 33816
2020-05-23 12:23:33
27.77.136.14 attackspam
Invalid user ubnt from 27.77.136.14 port 62855
2020-05-23 12:34:22
213.195.122.247 attackbotsspam
Invalid user ien from 213.195.122.247 port 60434
2020-05-23 12:02:56
58.11.16.96 attackspam
Invalid user ubnt from 58.11.16.96 port 57261
2020-05-23 12:28:35
217.54.187.42 attack
Invalid user service from 217.54.187.42 port 55445
2020-05-23 12:38:22
49.248.215.5 attackspam
Invalid user mzr from 49.248.215.5 port 47246
2020-05-23 12:30:12
200.41.86.59 attack
Invalid user rhp from 200.41.86.59 port 54314
2020-05-23 12:05:45
51.83.41.120 attackbotsspam
Invalid user fhx from 51.83.41.120 port 51808
2020-05-23 12:29:35
207.154.193.178 attackspambots
Invalid user dtg from 207.154.193.178 port 47862
2020-05-23 12:03:54

Recently Reported IPs

69.130.134.186 34.94.151.252 101.128.236.8 45.199.189.122
113.107.234.222 66.249.64.216 61.228.171.205 196.75.153.248
177.35.97.228 80.24.155.224 184.82.153.167 86.34.182.50
175.141.245.33 61.151.246.210 123.55.94.61 189.252.154.213
84.77.0.124 190.113.159.8 206.189.181.215 190.231.48.255