Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.129.206.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3704
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.129.206.21.			IN	A

;; AUTHORITY SECTION:
.			35	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010901 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 13:14:52 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 21.206.129.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.206.129.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.30.167 attackbotsspam
2020-08-24T06:37[Censored Hostname] sshd[21044]: Failed password for root from 222.186.30.167 port 23607 ssh2
2020-08-24T06:37[Censored Hostname] sshd[21044]: Failed password for root from 222.186.30.167 port 23607 ssh2
2020-08-24T06:37[Censored Hostname] sshd[21044]: Failed password for root from 222.186.30.167 port 23607 ssh2[...]
2020-08-24 12:40:12
68.183.82.166 attack
Aug 24 10:53:49 itv-usvr-02 sshd[9610]: Invalid user anupam from 68.183.82.166 port 34936
Aug 24 10:53:49 itv-usvr-02 sshd[9610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.82.166
Aug 24 10:53:49 itv-usvr-02 sshd[9610]: Invalid user anupam from 68.183.82.166 port 34936
Aug 24 10:53:51 itv-usvr-02 sshd[9610]: Failed password for invalid user anupam from 68.183.82.166 port 34936 ssh2
Aug 24 10:59:35 itv-usvr-02 sshd[9786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.82.166  user=root
Aug 24 10:59:37 itv-usvr-02 sshd[9786]: Failed password for root from 68.183.82.166 port 47990 ssh2
2020-08-24 12:41:28
198.27.69.130 attack
198.27.69.130 - - [24/Aug/2020:05:31:44 +0100] "POST /wp-login.php HTTP/1.1" 200 5920 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
198.27.69.130 - - [24/Aug/2020:05:32:52 +0100] "POST /wp-login.php HTTP/1.1" 200 5920 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
198.27.69.130 - - [24/Aug/2020:05:33:55 +0100] "POST /wp-login.php HTTP/1.1" 200 5927 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-08-24 12:46:27
46.245.119.166 attackbots
Port scan: Attack repeated for 24 hours
2020-08-24 12:28:16
101.51.127.56 attackspam
Aug 24 05:56:44 ncomp sshd[23560]: Invalid user service from 101.51.127.56
Aug 24 05:56:45 ncomp sshd[23560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.51.127.56
Aug 24 05:56:44 ncomp sshd[23560]: Invalid user service from 101.51.127.56
Aug 24 05:56:46 ncomp sshd[23560]: Failed password for invalid user service from 101.51.127.56 port 59941 ssh2
2020-08-24 12:22:51
113.162.7.43 attackbots
1598241384 - 08/24/2020 05:56:24 Host: 113.162.7.43/113.162.7.43 Port: 445 TCP Blocked
...
2020-08-24 12:41:04
195.103.184.6 attack
Unauthorised access (Aug 24) SRC=195.103.184.6 LEN=44 TTL=243 ID=9314 TCP DPT=1433 WINDOW=1024 SYN
2020-08-24 12:29:12
61.177.172.61 attackbots
Aug 24 06:32:55 eventyay sshd[6284]: Failed password for root from 61.177.172.61 port 38586 ssh2
Aug 24 06:33:19 eventyay sshd[6288]: Failed password for root from 61.177.172.61 port 15296 ssh2
Aug 24 06:33:37 eventyay sshd[6288]: error: maximum authentication attempts exceeded for root from 61.177.172.61 port 15296 ssh2 [preauth]
...
2020-08-24 12:41:54
49.232.5.122 attackbotsspam
(sshd) Failed SSH login from 49.232.5.122 (CN/China/-): 5 in the last 3600 secs
2020-08-24 12:17:28
162.247.74.216 attackspambots
Aug 24 05:56:58 vserver sshd\[30680\]: Failed password for root from 162.247.74.216 port 59728 ssh2Aug 24 05:57:01 vserver sshd\[30680\]: Failed password for root from 162.247.74.216 port 59728 ssh2Aug 24 05:57:03 vserver sshd\[30680\]: Failed password for root from 162.247.74.216 port 59728 ssh2Aug 24 05:57:05 vserver sshd\[30680\]: Failed password for root from 162.247.74.216 port 59728 ssh2
...
2020-08-24 12:12:00
129.204.231.225 attackspambots
2020-08-24T04:27:40.941466shield sshd\[23973\]: Invalid user norbi from 129.204.231.225 port 55054
2020-08-24T04:27:40.968623shield sshd\[23973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.231.225
2020-08-24T04:27:43.491903shield sshd\[23973\]: Failed password for invalid user norbi from 129.204.231.225 port 55054 ssh2
2020-08-24T04:32:07.203367shield sshd\[24845\]: Invalid user lab from 129.204.231.225 port 54832
2020-08-24T04:32:07.227494shield sshd\[24845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.231.225
2020-08-24 12:45:56
86.179.29.194 attack
Tried our host z.
2020-08-24 12:31:31
156.96.58.88 attackspambots
Aug 24 03:56:54 mail postfix/smtpd[37633]: warning: unknown[156.96.58.88]: SASL LOGIN authentication failed: generic failure
Aug 24 03:56:54 mail postfix/smtpd[37633]: warning: unknown[156.96.58.88]: SASL LOGIN authentication failed: generic failure
Aug 24 03:56:54 mail postfix/smtpd[37633]: warning: unknown[156.96.58.88]: SASL LOGIN authentication failed: generic failure
...
2020-08-24 12:20:03
78.199.19.89 attackbotsspam
Aug 24 06:11:07 fhem-rasp sshd[20761]: Invalid user krm from 78.199.19.89 port 53762
...
2020-08-24 12:27:47
101.251.206.30 attackspambots
ssh brute force
2020-08-24 12:26:13

Recently Reported IPs

113.168.228.137 147.164.117.253 115.213.145.77 207.69.52.134
233.233.251.135 170.153.148.89 111.15.171.116 233.94.247.242
114.121.101.164 149.109.73.172 192.255.128.176 174.59.86.143
221.251.215.92 66.56.83.177 141.53.134.144 85.22.139.177
10.207.226.30 150.145.175.145 14.144.205.212 172.117.40.215