Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Canterbury

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.12.13.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39889
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.12.13.73.			IN	A

;; AUTHORITY SECTION:
.			445	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022102000 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 20 17:19:24 CST 2022
;; MSG SIZE  rcvd: 105
Host info
73.13.12.129.in-addr.arpa domain name pointer dhcp0D49.kent.ac.uk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
73.13.12.129.in-addr.arpa	name = dhcp0D49.kent.ac.uk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.71.135.254 attackbotsspam
1586058592 - 04/05/2020 05:49:52 Host: 118.71.135.254/118.71.135.254 Port: 445 TCP Blocked
2020-04-05 19:00:52
51.254.32.102 attackbotsspam
Apr  5 15:09:04 gw1 sshd[4835]: Failed password for root from 51.254.32.102 port 37020 ssh2
...
2020-04-05 18:17:25
51.38.179.143 attackspam
Apr  5 10:17:46 *** sshd[18367]: User root from 51.38.179.143 not allowed because not listed in AllowUsers
2020-04-05 18:59:28
118.71.146.164 attack
firewall-block, port(s): 23/tcp
2020-04-05 18:42:08
66.249.75.111 attackspam
Unauthorized connection attempt detected, IP banned.
2020-04-05 18:58:57
51.178.78.154 attack
Apr  5 12:40:57 debian-2gb-nbg1-2 kernel: \[8342287.842096\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=51.178.78.154 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=58766 DPT=79 WINDOW=65535 RES=0x00 SYN URGP=0
2020-04-05 18:50:02
93.123.16.126 attackbotsspam
2020-04-05T09:52:01.028232abusebot-4.cloudsearch.cf sshd[29099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.123.16.126  user=root
2020-04-05T09:52:02.864118abusebot-4.cloudsearch.cf sshd[29099]: Failed password for root from 93.123.16.126 port 37950 ssh2
2020-04-05T09:55:13.054649abusebot-4.cloudsearch.cf sshd[29321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.123.16.126  user=root
2020-04-05T09:55:15.247081abusebot-4.cloudsearch.cf sshd[29321]: Failed password for root from 93.123.16.126 port 55716 ssh2
2020-04-05T09:57:22.603535abusebot-4.cloudsearch.cf sshd[29446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.123.16.126  user=root
2020-04-05T09:57:24.504831abusebot-4.cloudsearch.cf sshd[29446]: Failed password for root from 93.123.16.126 port 37178 ssh2
2020-04-05T09:59:41.893251abusebot-4.cloudsearch.cf sshd[29628]: pam_unix(sshd:auth): authe
...
2020-04-05 18:21:58
121.229.20.84 attackbots
SSH bruteforce (Triggered fail2ban)
2020-04-05 18:51:19
106.12.209.81 attack
Apr  5 06:55:01 mout sshd[21756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.209.81  user=root
Apr  5 06:55:03 mout sshd[21756]: Failed password for root from 106.12.209.81 port 47828 ssh2
2020-04-05 18:22:59
37.54.114.47 attackbotsspam
2020-04-05T03:50:08.215060abusebot-7.cloudsearch.cf sshd[16260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47-114-54-37.pool.ukrtel.net  user=root
2020-04-05T03:50:10.503249abusebot-7.cloudsearch.cf sshd[16260]: Failed password for root from 37.54.114.47 port 36982 ssh2
2020-04-05T03:50:13.295625abusebot-7.cloudsearch.cf sshd[16260]: Failed password for root from 37.54.114.47 port 36982 ssh2
2020-04-05T03:50:08.215060abusebot-7.cloudsearch.cf sshd[16260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47-114-54-37.pool.ukrtel.net  user=root
2020-04-05T03:50:10.503249abusebot-7.cloudsearch.cf sshd[16260]: Failed password for root from 37.54.114.47 port 36982 ssh2
2020-04-05T03:50:13.295625abusebot-7.cloudsearch.cf sshd[16260]: Failed password for root from 37.54.114.47 port 36982 ssh2
2020-04-05T03:50:08.215060abusebot-7.cloudsearch.cf sshd[16260]: pam_unix(sshd:auth): authentication failure; logname=
...
2020-04-05 18:36:59
5.178.79.212 attackspambots
WordPress XMLRPC scan :: 5.178.79.212 0.172 - [05/Apr/2020:05:39:24  0000] www.[censored_1] "POST /xmlrpc.php HTTP/1.1" 200 236 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-04-05 18:16:52
118.25.51.181 attackbots
SSH brute force attempt
2020-04-05 18:51:54
221.122.67.66 attack
Invalid user jcn from 221.122.67.66 port 52542
2020-04-05 18:45:58
144.217.136.227 attackspambots
<6 unauthorized SSH connections
2020-04-05 18:31:38
182.232.25.224 attackspam
20/4/5@01:19:36: FAIL: Alarm-Network address from=182.232.25.224
20/4/5@01:19:36: FAIL: Alarm-Network address from=182.232.25.224
...
2020-04-05 18:32:10

Recently Reported IPs

24.21.180.218 43.104.191.160 134.14.114.85 40.31.73.55
230.23.165.17 97.250.77.182 9.106.88.143 2.192.78.19
70.242.69.218 238.14.8.149 196.218.144.207 203.99.82.231
19.90.131.159 63.234.169.130 53.199.22.221 185.116.80.191
95.165.103.105 34.195.197.29 48.159.5.65 150.37.222.78