Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Zürich

Region: Zurich

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.132.69.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17138
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.132.69.28.			IN	A

;; AUTHORITY SECTION:
.			328	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060601 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 07 09:12:50 CST 2024
;; MSG SIZE  rcvd: 106
Host info
28.69.132.129.in-addr.arpa domain name pointer inf-isg-cx771-28.inf.ethz.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
28.69.132.129.in-addr.arpa	name = inf-isg-cx771-28.inf.ethz.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
153.36.236.35 attackbotsspam
Reported by AbuseIPDB proxy server.
2019-08-12 05:42:38
157.230.39.152 attackbots
2019-08-11T19:40:19.924001abusebot.cloudsearch.cf sshd\[6959\]: Invalid user rootteam from 157.230.39.152 port 47050
2019-08-11T19:40:19.928740abusebot.cloudsearch.cf sshd\[6959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.39.152
2019-08-12 05:36:10
185.209.0.17 attack
Portscan or hack attempt detected by psad/fwsnort
2019-08-12 06:21:15
113.17.16.111 attackspambots
firewall-block, port(s): 22/tcp
2019-08-12 05:51:20
35.232.104.147 attack
Unauthorised access (Aug 12) SRC=35.232.104.147 LEN=40 PREC=0x20 TTL=55 ID=42738 TCP DPT=23 WINDOW=63234 SYN
2019-08-12 05:46:55
23.129.64.165 attack
Aug 11 20:19:32 vps sshd[16318]: Failed password for root from 23.129.64.165 port 48662 ssh2
Aug 11 20:19:34 vps sshd[16318]: Failed password for root from 23.129.64.165 port 48662 ssh2
Aug 11 20:19:37 vps sshd[16318]: Failed password for root from 23.129.64.165 port 48662 ssh2
Aug 11 20:19:40 vps sshd[16318]: Failed password for root from 23.129.64.165 port 48662 ssh2
...
2019-08-12 06:10:06
93.118.235.232 attack
Automatic report - Port Scan Attack
2019-08-12 05:53:45
200.196.249.170 attackbots
Aug 12 00:08:01 localhost sshd\[17556\]: Invalid user djlhc111com from 200.196.249.170 port 49588
Aug 12 00:08:01 localhost sshd\[17556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.196.249.170
Aug 12 00:08:03 localhost sshd\[17556\]: Failed password for invalid user djlhc111com from 200.196.249.170 port 49588 ssh2
2019-08-12 06:09:37
148.251.92.39 attack
20 attempts against mh-misbehave-ban on sonic.magehost.pro
2019-08-12 06:04:11
200.107.154.3 attackbots
Aug 12 03:29:12 vibhu-HP-Z238-Microtower-Workstation sshd\[18150\]: Invalid user webadmin from 200.107.154.3
Aug 12 03:29:12 vibhu-HP-Z238-Microtower-Workstation sshd\[18150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.107.154.3
Aug 12 03:29:14 vibhu-HP-Z238-Microtower-Workstation sshd\[18150\]: Failed password for invalid user webadmin from 200.107.154.3 port 41967 ssh2
Aug 12 03:34:12 vibhu-HP-Z238-Microtower-Workstation sshd\[18273\]: Invalid user empire from 200.107.154.3
Aug 12 03:34:12 vibhu-HP-Z238-Microtower-Workstation sshd\[18273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.107.154.3
...
2019-08-12 06:15:34
201.22.16.163 attackbotsspam
Aug 12 00:55:43 www sshd\[30104\]: Invalid user debian@123 from 201.22.16.163
Aug 12 00:55:43 www sshd\[30104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.22.16.163
Aug 12 00:55:45 www sshd\[30104\]: Failed password for invalid user debian@123 from 201.22.16.163 port 47303 ssh2
...
2019-08-12 06:09:22
128.73.222.227 attackbotsspam
SMB Server BruteForce Attack
2019-08-12 05:45:01
186.103.222.139 attack
2019-08-11 13:09:43 H=(186-103-222-139.static.tie.cl) [186.103.222.139]:38825 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/query/ip/186.103.222.139)
2019-08-11 13:09:44 H=(186-103-222-139.static.tie.cl) [186.103.222.139]:38825 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-08-11 13:09:45 H=(186-103-222-139.static.tie.cl) [186.103.222.139]:38825 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/query/ip/186.103.222.139)
...
2019-08-12 06:02:52
115.159.24.74 attack
firewall-block, port(s): 8545/tcp
2019-08-12 05:49:22
202.169.245.10 attackbotsspam
Aug 11 12:09:13 mail postfix/postscreen[14897]: PREGREET 17 after 2.1 from [202.169.245.10]:38540: EHLO litopat.it

...
2019-08-12 06:02:33

Recently Reported IPs

146.208.118.225 97.102.147.227 45.148.1.128 26.48.81.250
214.135.204.203 78.31.34.23 59.69.199.20 26.190.206.101
15.98.150.5 234.41.41.232 214.185.19.237 228.8.5.115
70.212.99.25 204.168.14.229 152.149.230.180 40.251.152.222
137.188.129.140 100.129.21.172 246.51.241.241 80.221.36.33