Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.144.221.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48016
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.144.221.104.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024122200 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 22 15:53:20 CST 2024
;; MSG SIZE  rcvd: 108
Host info
104.221.144.129.in-addr.arpa domain name pointer oc-129-144-221-104.compute.oraclecloud.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.221.144.129.in-addr.arpa	name = oc-129-144-221-104.compute.oraclecloud.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.83.110.68 attackbots
Jun 24 12:05:30 vps sshd[571629]: Failed password for invalid user umulus from 222.83.110.68 port 32942 ssh2
Jun 24 12:10:38 vps sshd[599932]: Invalid user roseanne from 222.83.110.68 port 34610
Jun 24 12:10:38 vps sshd[599932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.83.110.68
Jun 24 12:10:40 vps sshd[599932]: Failed password for invalid user roseanne from 222.83.110.68 port 34610 ssh2
Jun 24 12:15:59 vps sshd[624863]: Invalid user ca from 222.83.110.68 port 36264
...
2020-06-24 19:13:54
98.249.68.143 attackspam
"SSH brute force auth login attempt."
2020-06-24 18:58:46
124.105.173.17 attackbotsspam
frenzy
2020-06-24 19:01:36
112.73.0.146 attackspam
2020-06-23 UTC: (47x) - admin2,almacen,amt,arthur,cameron,crx,dante,db,flow,ftpuser(2x),fw,ghost,git,guru,icecast,isaac,jono,lotte,mcserver,minecraft,opl,oracle,qcj,root(9x),starbound,steve,support,sys,temp,test,uftp,user,video,vmail,vncuser,weblogic,wj,yan
2020-06-24 19:09:53
128.199.92.187 attackspam
" "
2020-06-24 18:59:07
5.128.121.2 attackbotsspam
firewall-block, port(s): 445/tcp
2020-06-24 18:56:15
5.188.210.203 attackspam
Port scan on 3 port(s): 8080 8181 53281
2020-06-24 18:42:32
4.16.61.171 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-06-24 18:42:55
78.90.247.14 attackspambots
Automatic report - XMLRPC Attack
2020-06-24 18:44:58
86.181.38.134 attackbotsspam
Automatic report - Port Scan
2020-06-24 19:17:29
188.166.232.29 attackspambots
srv02 Mass scanning activity detected Target: 17134  ..
2020-06-24 19:03:36
171.220.243.128 attack
 TCP (SYN) 171.220.243.128:54426 -> port 6435, len 44
2020-06-24 19:05:50
196.188.40.45 attackbots
Invalid user pippo from 196.188.40.45 port 42785
2020-06-24 18:57:19
89.147.72.40 attackbots
Invalid user cvs from 89.147.72.40 port 58631
2020-06-24 18:52:01
175.0.9.106 attackbotsspam
(ftpd) Failed FTP login from 175.0.9.106 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jun 24 12:32:56 ir1 pure-ftpd: (?@175.0.9.106) [WARNING] Authentication failed for user [hotelavin]
2020-06-24 19:01:13

Recently Reported IPs

163.34.253.26 6.57.4.152 59.61.35.239 198.175.28.62
106.5.251.162 255.66.31.236 104.231.39.217 139.204.195.251
59.162.55.133 42.189.92.10 208.58.147.110 170.81.190.131
141.16.188.33 79.110.62.199 116.220.124.59 66.238.131.119
172.4.167.255 144.67.80.37 214.254.193.42 209.43.2.36