Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.142.58.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12057
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.142.58.149.			IN	A

;; AUTHORITY SECTION:
.			293	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010901 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 13:20:05 CST 2022
;; MSG SIZE  rcvd: 107
Host info
149.58.142.129.in-addr.arpa domain name pointer 129142058149.mbb.telenor.dk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.58.142.129.in-addr.arpa	name = 129142058149.mbb.telenor.dk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
60.167.178.40 attackspambots
Jul 10 07:00:32 h2779839 sshd[32346]: Invalid user jianzuoyi from 60.167.178.40 port 42376
Jul 10 07:00:32 h2779839 sshd[32346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.178.40
Jul 10 07:00:32 h2779839 sshd[32346]: Invalid user jianzuoyi from 60.167.178.40 port 42376
Jul 10 07:00:35 h2779839 sshd[32346]: Failed password for invalid user jianzuoyi from 60.167.178.40 port 42376 ssh2
Jul 10 07:03:33 h2779839 sshd[32454]: Invalid user renhuihuang from 60.167.178.40 port 36204
Jul 10 07:03:33 h2779839 sshd[32454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.178.40
Jul 10 07:03:33 h2779839 sshd[32454]: Invalid user renhuihuang from 60.167.178.40 port 36204
Jul 10 07:03:36 h2779839 sshd[32454]: Failed password for invalid user renhuihuang from 60.167.178.40 port 36204 ssh2
Jul 10 07:06:38 h2779839 sshd[32536]: Invalid user vanita from 60.167.178.40 port 58260
...
2020-07-10 13:37:31
111.229.50.131 attackbots
Jul 10 05:55:44 ArkNodeAT sshd\[6120\]: Invalid user durai from 111.229.50.131
Jul 10 05:55:44 ArkNodeAT sshd\[6120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.50.131
Jul 10 05:55:46 ArkNodeAT sshd\[6120\]: Failed password for invalid user durai from 111.229.50.131 port 36628 ssh2
2020-07-10 13:49:12
106.13.233.4 attackspambots
2020-07-10T10:51:26.308256SusPend.routelink.net.id sshd[12084]: Invalid user yutianyu from 106.13.233.4 port 59524
2020-07-10T10:51:28.366634SusPend.routelink.net.id sshd[12084]: Failed password for invalid user yutianyu from 106.13.233.4 port 59524 ssh2
2020-07-10T10:55:58.659940SusPend.routelink.net.id sshd[12544]: Invalid user public from 106.13.233.4 port 53450
...
2020-07-10 13:36:48
104.215.75.0 attack
2020-07-10T07:13:00.981691vps773228.ovh.net sshd[23501]: Failed password for invalid user udin from 104.215.75.0 port 39894 ssh2
2020-07-10T07:15:54.829417vps773228.ovh.net sshd[23522]: Invalid user hruan from 104.215.75.0 port 55486
2020-07-10T07:15:54.843300vps773228.ovh.net sshd[23522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.215.75.0
2020-07-10T07:15:54.829417vps773228.ovh.net sshd[23522]: Invalid user hruan from 104.215.75.0 port 55486
2020-07-10T07:15:56.974991vps773228.ovh.net sshd[23522]: Failed password for invalid user hruan from 104.215.75.0 port 55486 ssh2
...
2020-07-10 13:54:45
192.186.173.10 attackbotsspam
Automatic report - Banned IP Access
2020-07-10 13:53:57
49.235.251.53 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-07-10 13:19:56
51.77.140.110 attackspam
51.77.140.110 - - [10/Jul/2020:06:26:19 +0200] "POST /xmlrpc.php HTTP/1.1" 403 12787 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.77.140.110 - - [10/Jul/2020:06:47:48 +0200] "POST /xmlrpc.php HTTP/1.1" 403 12787 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-10 13:47:30
84.17.46.177 attackspambots
(From sewell.christena@gmail.com) Looking for fresh buyers? Get hundreds of keyword targeted visitors directly to your site. Boost your profits super fast. Start seeing results in as little as 48 hours. To get info Have a look at: http://www.getwebsitevisitors.xyz
2020-07-10 13:28:21
94.139.177.28 attackspam
(smtpauth) Failed SMTP AUTH login from 94.139.177.28 (IR/Iran/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-10 08:25:57 plain authenticator failed for ([94.139.177.28]) [94.139.177.28]: 535 Incorrect authentication data (set_id=info@nemachin.com)
2020-07-10 13:41:39
49.65.246.178 attackbotsspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-10T04:20:58Z and 2020-07-10T04:26:37Z
2020-07-10 13:39:41
1.2.132.220 attack
1594353375 - 07/10/2020 10:56:15 Host: node-yk.pool-1-2.dynamic.totinternet.net/1.2.132.220 Port: 26 TCP Blocked
...
2020-07-10 13:23:57
129.204.254.143 attack
Jul 10 05:55:42 vmd17057 sshd[25067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.254.143 
Jul 10 05:55:43 vmd17057 sshd[25067]: Failed password for invalid user yuan from 129.204.254.143 port 52126 ssh2
...
2020-07-10 13:52:08
218.92.0.252 attack
Jul 10 07:06:56 server sshd[15578]: Failed none for root from 218.92.0.252 port 59553 ssh2
Jul 10 07:06:59 server sshd[15578]: Failed password for root from 218.92.0.252 port 59553 ssh2
Jul 10 07:07:04 server sshd[15578]: Failed password for root from 218.92.0.252 port 59553 ssh2
2020-07-10 13:17:22
151.252.105.132 attack
$f2bV_matches
2020-07-10 13:43:03
47.22.82.8 attackbotsspam
Jul 10 04:03:00 django-0 sshd[23973]: Invalid user fuku from 47.22.82.8
...
2020-07-10 13:40:43

Recently Reported IPs

195.65.185.177 232.23.182.95 254.240.245.160 106.181.6.183
14.174.170.244 141.69.206.222 93.158.161.0 136.10.251.101
165.166.23.240 130.67.66.108 23.16.164.123 223.27.95.61
113.138.28.232 141.229.91.204 154.42.66.166 189.218.152.215
213.98.50.101 105.235.188.36 164.190.221.72 151.227.64.86