Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.133.194.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34928
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.133.194.42.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 19:06:38 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 42.194.133.129.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 129.133.194.42.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
64.227.25.170 attackbots
Invalid user at from 64.227.25.170 port 52678
2020-03-28 09:27:50
206.189.137.113 attackspambots
Mar 28 01:55:25 ArkNodeAT sshd\[15182\]: Invalid user usuario from 206.189.137.113
Mar 28 01:55:25 ArkNodeAT sshd\[15182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.137.113
Mar 28 01:55:27 ArkNodeAT sshd\[15182\]: Failed password for invalid user usuario from 206.189.137.113 port 40476 ssh2
2020-03-28 09:23:40
157.230.143.29 attack
Unauthorized connection attempt detected from IP address 157.230.143.29 to port 9000
2020-03-28 09:10:56
5.196.198.147 attackbotsspam
Mar 28 00:03:43 vmd26974 sshd[31000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.198.147
Mar 28 00:03:45 vmd26974 sshd[31000]: Failed password for invalid user aurea from 5.196.198.147 port 44498 ssh2
...
2020-03-28 09:30:20
180.242.223.40 attack
SSH Brute-Forcing (server1)
2020-03-28 09:12:35
197.253.207.155 attackspam
IP blocked
2020-03-28 09:24:05
31.41.255.34 attack
Mar 27 19:22:49 firewall sshd[7863]: Invalid user uiz from 31.41.255.34
Mar 27 19:22:51 firewall sshd[7863]: Failed password for invalid user uiz from 31.41.255.34 port 57836 ssh2
Mar 27 19:26:26 firewall sshd[8079]: Invalid user hpq from 31.41.255.34
...
2020-03-28 09:22:07
139.59.38.252 attack
Mar 28 01:28:19 serwer sshd\[7499\]: Invalid user fys from 139.59.38.252 port 54968
Mar 28 01:28:19 serwer sshd\[7499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.38.252
Mar 28 01:28:21 serwer sshd\[7499\]: Failed password for invalid user fys from 139.59.38.252 port 54968 ssh2
...
2020-03-28 09:20:10
149.202.55.18 attackspambots
SSH Brute-Force Attack
2020-03-28 12:13:09
148.70.223.29 attackbotsspam
Mar 28 04:55:47 ourumov-web sshd\[28210\]: Invalid user zyu from 148.70.223.29 port 60828
Mar 28 04:55:47 ourumov-web sshd\[28210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.223.29
Mar 28 04:55:49 ourumov-web sshd\[28210\]: Failed password for invalid user zyu from 148.70.223.29 port 60828 ssh2
...
2020-03-28 12:01:23
68.183.147.162 attackbots
Mar 28 04:53:40 vps sshd[279983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.147.162
Mar 28 04:53:41 vps sshd[279983]: Failed password for invalid user fbp from 68.183.147.162 port 59554 ssh2
Mar 28 04:57:01 vps sshd[299644]: Invalid user sie from 68.183.147.162 port 44850
Mar 28 04:57:01 vps sshd[299644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.147.162
Mar 28 04:57:03 vps sshd[299644]: Failed password for invalid user sie from 68.183.147.162 port 44850 ssh2
...
2020-03-28 12:04:26
104.131.73.105 attackspam
IP attempted unauthorised action
2020-03-28 12:16:10
37.254.5.165 attack
Port probing on unauthorized port 23
2020-03-28 09:38:25
49.235.229.211 attackbotsspam
SSH brute force
2020-03-28 09:16:38
222.186.15.91 attackspambots
Mar 28 05:05:03 dcd-gentoo sshd[11415]: User root from 222.186.15.91 not allowed because none of user's groups are listed in AllowGroups
Mar 28 05:05:06 dcd-gentoo sshd[11415]: error: PAM: Authentication failure for illegal user root from 222.186.15.91
Mar 28 05:05:03 dcd-gentoo sshd[11415]: User root from 222.186.15.91 not allowed because none of user's groups are listed in AllowGroups
Mar 28 05:05:06 dcd-gentoo sshd[11415]: error: PAM: Authentication failure for illegal user root from 222.186.15.91
Mar 28 05:05:03 dcd-gentoo sshd[11415]: User root from 222.186.15.91 not allowed because none of user's groups are listed in AllowGroups
Mar 28 05:05:06 dcd-gentoo sshd[11415]: error: PAM: Authentication failure for illegal user root from 222.186.15.91
Mar 28 05:05:06 dcd-gentoo sshd[11415]: Failed keyboard-interactive/pam for invalid user root from 222.186.15.91 port 31539 ssh2
...
2020-03-28 12:11:16

Recently Reported IPs

28.228.71.255 155.195.39.147 218.200.40.74 227.54.56.124
187.245.92.245 3.202.246.93 131.189.28.177 249.197.34.21
27.58.197.155 7.72.116.234 240.106.70.241 119.127.63.79
142.195.169.105 6.172.147.119 104.164.42.6 208.88.22.77
173.147.245.16 26.154.132.107 201.109.235.163 122.174.223.109