Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.145.22.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3686
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.145.22.42.			IN	A

;; AUTHORITY SECTION:
.			361	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 16:59:06 CST 2022
;; MSG SIZE  rcvd: 106
Host info
42.22.145.129.in-addr.arpa domain name pointer mail03.e.response.mayoclinic.org.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.22.145.129.in-addr.arpa	name = mail03.e.response.mayoclinic.org.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.83.128.24 attackbots
Nov 24 07:21:22 sachi sshd\[25195\]: Invalid user guest from 51.83.128.24
Nov 24 07:21:22 sachi sshd\[25195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.ip-51-83-128.eu
Nov 24 07:21:25 sachi sshd\[25195\]: Failed password for invalid user guest from 51.83.128.24 port 34610 ssh2
Nov 24 07:27:45 sachi sshd\[25707\]: Invalid user test from 51.83.128.24
Nov 24 07:27:45 sachi sshd\[25707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.ip-51-83-128.eu
2019-11-25 01:53:01
5.14.1.78 attack
Automatic report - Port Scan Attack
2019-11-25 01:41:02
167.71.195.66 attack
DNS
2019-11-25 02:18:04
95.178.156.19 attack
Telnetd brute force attack detected by fail2ban
2019-11-25 02:02:22
193.171.202.150 attackspam
Joomla User : try to access forms...
2019-11-25 02:07:13
89.248.174.223 attackbots
11/24/2019-13:14:27.071420 89.248.174.223 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-25 02:14:45
92.118.37.86 attackspam
firewall-block, port(s): 1286/tcp, 1432/tcp, 1611/tcp, 1639/tcp, 1800/tcp, 1939/tcp, 1946/tcp
2019-11-25 01:40:40
88.237.44.190 attackspambots
LGS,WP GET /wp-login.php
2019-11-25 02:18:56
182.59.190.223 attackspambots
Automatic report - Port Scan Attack
2019-11-25 02:06:26
154.0.171.226 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.0.171.226  user=root
Failed password for root from 154.0.171.226 port 47384 ssh2
Invalid user patoka from 154.0.171.226 port 58454
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.0.171.226
Failed password for invalid user patoka from 154.0.171.226 port 58454 ssh2
2019-11-25 01:41:20
117.173.67.119 attackbotsspam
Nov 24 15:51:40 ArkNodeAT sshd\[11521\]: Invalid user rebecca from 117.173.67.119
Nov 24 15:51:40 ArkNodeAT sshd\[11521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.173.67.119
Nov 24 15:51:42 ArkNodeAT sshd\[11521\]: Failed password for invalid user rebecca from 117.173.67.119 port 2217 ssh2
2019-11-25 01:55:04
218.93.27.230 attack
port scan and connect, tcp 1433 (ms-sql-s)
2019-11-25 01:51:22
165.22.81.128 attack
xmlrpc attack
2019-11-25 01:59:15
80.211.80.154 attackspam
Nov 24 19:01:48 jane sshd[25228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.80.154 
Nov 24 19:01:50 jane sshd[25228]: Failed password for invalid user ryan from 80.211.80.154 port 46438 ssh2
...
2019-11-25 02:03:35
221.226.177.142 attack
Nov 22 07:45:36 km20725 sshd[27284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.226.177.142  user=minecraft
Nov 22 07:45:38 km20725 sshd[27284]: Failed password for minecraft from 221.226.177.142 port 12351 ssh2
Nov 22 07:45:39 km20725 sshd[27284]: Received disconnect from 221.226.177.142: 11: Bye Bye [preauth]
Nov 22 08:00:21 km20725 sshd[28145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.226.177.142  user=backup
Nov 22 08:00:23 km20725 sshd[28145]: Failed password for backup from 221.226.177.142 port 12408 ssh2
Nov 22 08:00:23 km20725 sshd[28145]: Received disconnect from 221.226.177.142: 11: Bye Bye [preauth]
Nov 22 08:07:35 km20725 sshd[28443]: Invalid user augy from 221.226.177.142
Nov 22 08:07:35 km20725 sshd[28443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.226.177.142
Nov 22 08:07:37 km20725 sshd[28443]: Failed passw........
-------------------------------
2019-11-25 01:50:51

Recently Reported IPs

129.146.202.249 129.146.255.132 129.146.44.21 129.151.76.54
129.153.159.147 129.146.21.235 129.154.234.136 129.154.48.156
129.203.248.1 129.126.131.85 129.203.97.1 129.195.247.41
129.204.56.157 47.18.48.32 129.203.113.1 129.204.132.163
129.205.110.162 129.206.13.28 129.205.210.162 221.238.68.70