Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.139.63.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60810
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.139.63.105.			IN	A

;; AUTHORITY SECTION:
.			180	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 23:45:48 CST 2022
;; MSG SIZE  rcvd: 107
Host info
b'Host 105.63.139.129.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
server can't find 129.139.63.105.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
188.19.46.101 attackbotsspam
Unauthorized connection attempt from IP address 188.19.46.101 on Port 445(SMB)
2019-09-04 10:45:17
189.91.6.76 attackbotsspam
Brute force attempt
2019-09-04 10:15:36
64.113.32.29 attack
Sep  4 04:02:26 ArkNodeAT sshd\[15686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.113.32.29  user=root
Sep  4 04:02:29 ArkNodeAT sshd\[15686\]: Failed password for root from 64.113.32.29 port 34365 ssh2
Sep  4 04:02:37 ArkNodeAT sshd\[15686\]: Failed password for root from 64.113.32.29 port 34365 ssh2
2019-09-04 10:25:20
186.251.201.14 attackspam
$f2bV_matches
2019-09-04 10:41:00
177.190.90.12 attackbotsspam
Brute force attempt
2019-09-04 10:04:57
103.4.62.62 attackbotsspam
Unauthorized connection attempt from IP address 103.4.62.62 on Port 445(SMB)
2019-09-04 10:28:02
23.129.64.183 attackbotsspam
Sep  4 02:02:01 thevastnessof sshd[10784]: Failed password for root from 23.129.64.183 port 58644 ssh2
...
2019-09-04 10:13:43
197.97.155.4 attackbots
Unauthorized connection attempt from IP address 197.97.155.4 on Port 445(SMB)
2019-09-04 10:11:07
180.126.233.194 attack
SSH Brute-Force reported by Fail2Ban
2019-09-04 10:35:11
167.71.223.191 attackbotsspam
Sep  4 00:03:55 www_kotimaassa_fi sshd[21097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.223.191
Sep  4 00:03:57 www_kotimaassa_fi sshd[21097]: Failed password for invalid user ams from 167.71.223.191 port 58400 ssh2
...
2019-09-04 10:46:15
50.239.143.195 attackspambots
Sep  3 10:05:02 tdfoods sshd\[11954\]: Invalid user seoulselection from 50.239.143.195
Sep  3 10:05:02 tdfoods sshd\[11954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.143.195
Sep  3 10:05:04 tdfoods sshd\[11954\]: Failed password for invalid user seoulselection from 50.239.143.195 port 53652 ssh2
Sep  3 10:09:07 tdfoods sshd\[12421\]: Invalid user july from 50.239.143.195
Sep  3 10:09:07 tdfoods sshd\[12421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.143.195
2019-09-04 10:16:32
186.153.138.2 attackspambots
Too many connections or unauthorized access detected from Arctic banned ip
2019-09-04 10:21:21
194.78.58.50 attack
Unauthorized connection attempt from IP address 194.78.58.50 on Port 445(SMB)
2019-09-04 10:10:27
134.209.178.109 attackbots
$f2bV_matches
2019-09-04 10:11:51
134.249.226.39 attack
Unauthorized connection attempt from IP address 134.249.226.39 on Port 445(SMB)
2019-09-04 10:38:05

Recently Reported IPs

178.127.159.28 17.70.17.150 7.149.71.97 138.25.20.205
100.212.230.124 135.203.22.198 120.110.246.194 245.88.255.206
149.106.214.47 132.103.65.0 205.127.73.82 162.179.21.246
162.217.196.91 171.126.202.80 173.69.238.121 153.122.242.233
123.0.224.88 99.242.14.50 232.156.164.28 242.230.172.12