Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Malawi

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.140.213.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27991
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.140.213.168.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 23:19:38 CST 2025
;; MSG SIZE  rcvd: 108
Host info
168.213.140.129.in-addr.arpa domain name pointer 168-213-140-129.r.airtel.mw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
168.213.140.129.in-addr.arpa	name = 168-213-140-129.r.airtel.mw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
13.82.218.103 attack
Jul 15 11:22:14 ws12vmsma01 sshd[34794]: Invalid user ufn from 13.82.218.103
Jul 15 11:22:14 ws12vmsma01 sshd[34795]: Invalid user edu from 13.82.218.103
Jul 15 11:22:14 ws12vmsma01 sshd[34793]: Invalid user ufn.edu.br from 13.82.218.103
...
2020-07-15 22:50:24
190.139.74.115 attackbots
Unauthorized connection attempt from IP address 190.139.74.115 on Port 445(SMB)
2020-07-15 22:38:16
167.172.184.220 attackspambots
$f2bV_matches
2020-07-15 22:29:48
119.45.0.217 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-15 22:25:11
213.202.211.200 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-15 22:27:39
109.226.199.41 attackspambots
20/7/15@11:00:55: FAIL: Alarm-Network address from=109.226.199.41
...
2020-07-15 23:03:47
61.177.172.102 attack
Jul 15 20:00:48 gw1 sshd[23293]: Failed password for root from 61.177.172.102 port 35528 ssh2
...
2020-07-15 23:01:54
86.164.151.183 attackspam
Automatic report - Port Scan Attack
2020-07-15 22:22:57
62.28.253.197 attackbots
Jul 15 10:14:14 ny01 sshd[23371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.28.253.197
Jul 15 10:14:17 ny01 sshd[23371]: Failed password for invalid user ljf from 62.28.253.197 port 4626 ssh2
Jul 15 10:18:57 ny01 sshd[23970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.28.253.197
2020-07-15 22:32:18
125.137.236.50 attackbots
5x Failed Password
2020-07-15 22:31:21
106.12.200.239 attack
2020-07-15 16:15:12,048 fail2ban.actions: WARNING [ssh] Ban 106.12.200.239
2020-07-15 22:54:04
13.78.230.118 attack
Jul 15 07:57:39 ns3033917 sshd[21068]: Invalid user admin from 13.78.230.118 port 1024
Jul 15 07:57:41 ns3033917 sshd[21068]: Failed password for invalid user admin from 13.78.230.118 port 1024 ssh2
Jul 15 14:39:29 ns3033917 sshd[27521]: Invalid user grandpied.fr from 13.78.230.118 port 1217
...
2020-07-15 22:42:28
144.217.203.24 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-15 22:30:01
13.76.94.26 attack
Jul 15 15:55:00 rocket sshd[13524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.94.26
...
2020-07-15 23:02:58
45.55.224.209 attackspambots
2020-07-15T14:24:34.553586shield sshd\[27812\]: Invalid user kong from 45.55.224.209 port 35939
2020-07-15T14:24:34.562697shield sshd\[27812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.224.209
2020-07-15T14:24:36.446724shield sshd\[27812\]: Failed password for invalid user kong from 45.55.224.209 port 35939 ssh2
2020-07-15T14:27:59.693753shield sshd\[28197\]: Invalid user kumar from 45.55.224.209 port 34901
2020-07-15T14:27:59.703733shield sshd\[28197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.224.209
2020-07-15 22:33:29

Recently Reported IPs

104.187.53.32 73.70.184.206 45.140.237.183 7.223.115.111
185.98.130.85 57.162.125.64 202.129.22.82 215.203.233.64
61.152.67.245 52.20.217.137 124.68.195.11 235.153.114.68
209.12.180.237 45.7.29.150 103.185.69.138 29.7.102.83
208.41.196.33 133.41.132.34 246.151.55.81 219.35.85.193