Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.146.242.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31051
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.146.242.169.		IN	A

;; AUTHORITY SECTION:
.			283	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100700 1800 900 604800 86400

;; Query time: 130 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 08 00:06:45 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 169.242.146.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 169.242.146.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.193.243.35 attack
2020-06-03T08:49:17.6304771495-001 sshd[64992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.193.243.35  user=root
2020-06-03T08:49:19.6336631495-001 sshd[64992]: Failed password for root from 113.193.243.35 port 55762 ssh2
2020-06-03T08:53:22.6783841495-001 sshd[65143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.193.243.35  user=root
2020-06-03T08:53:24.3151371495-001 sshd[65143]: Failed password for root from 113.193.243.35 port 59674 ssh2
2020-06-03T08:57:21.1061441495-001 sshd[65295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.193.243.35  user=root
2020-06-03T08:57:23.5551351495-001 sshd[65295]: Failed password for root from 113.193.243.35 port 35330 ssh2
...
2020-06-03 22:06:00
187.114.212.143 attackspam
Automatic report - Port Scan Attack
2020-06-03 22:04:07
222.223.32.228 attackspam
Jun  3 15:47:27 buvik sshd[3960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.223.32.228
Jun  3 15:47:29 buvik sshd[3960]: Failed password for invalid user ou812\r from 222.223.32.228 port 60705 ssh2
Jun  3 15:51:53 buvik sshd[4592]: Invalid user 123 from 222.223.32.228
...
2020-06-03 22:08:44
193.27.228.13 attack
[H1.VM8] Blocked by UFW
2020-06-03 22:26:16
111.95.141.34 attackbots
Jun  3 20:47:40 webhost01 sshd[7753]: Failed password for root from 111.95.141.34 port 54165 ssh2
...
2020-06-03 22:34:04
188.165.255.134 attackbots
188.165.255.134 - - [03/Jun/2020:13:54:53 +0200] "GET /wp-login.php HTTP/1.1" 200 6433 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
188.165.255.134 - - [03/Jun/2020:13:54:55 +0200] "POST /wp-login.php HTTP/1.1" 200 6738 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
188.165.255.134 - - [03/Jun/2020:13:54:56 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-03 22:22:04
14.143.107.226 attackspam
Jun  3 11:05:47 vps46666688 sshd[7113]: Failed password for root from 14.143.107.226 port 58580 ssh2
...
2020-06-03 22:25:23
51.89.149.213 attack
Jun  3 19:16:32 itv-usvr-02 sshd[1308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.149.213  user=root
Jun  3 19:18:13 itv-usvr-02 sshd[1340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.149.213  user=root
Jun  3 19:19:14 itv-usvr-02 sshd[1460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.149.213  user=root
2020-06-03 22:06:31
201.48.192.60 attackspambots
2020-06-03T13:54:55.953765+02:00  sshd[16840]: Failed password for root from 201.48.192.60 port 44852 ssh2
2020-06-03 22:13:47
184.168.46.207 attackbots
LGS,WP GET /wordpress/wp-includes/wlwmanifest.xml
2020-06-03 22:33:15
157.230.216.233 attackbots
Lines containing failures of 157.230.216.233
Jun  1 03:32:28 shared11 sshd[24672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.216.233  user=r.r
Jun  1 03:32:30 shared11 sshd[24672]: Failed password for r.r from 157.230.216.233 port 45252 ssh2
Jun  1 03:32:30 shared11 sshd[24672]: Received disconnect from 157.230.216.233 port 45252:11: Bye Bye [preauth]
Jun  1 03:32:30 shared11 sshd[24672]: Disconnected from authenticating user r.r 157.230.216.233 port 45252 [preauth]
Jun  1 05:50:01 shared11 sshd[5175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.216.233  user=r.r
Jun  1 05:50:03 shared11 sshd[5175]: Failed password for r.r from 157.230.216.233 port 56848 ssh2
Jun  1 05:50:03 shared11 sshd[5175]: Received disconnect from 157.230.216.233 port 56848:11: Bye Bye [preauth]
Jun  1 05:50:03 shared11 sshd[5175]: Disconnected from authenticating user r.r 157.230.216.233 port ........
------------------------------
2020-06-03 22:09:02
111.93.235.74 attackbotsspam
1591189170 - 06/03/2020 14:59:30 Host: 111.93.235.74/111.93.235.74 Port: 445 TCP Blocked
2020-06-03 22:21:35
62.171.144.195 attackbots
[2020-06-03 10:19:27] NOTICE[1288] chan_sip.c: Registration from '' failed for '62.171.144.195:42799' - Wrong password
[2020-06-03 10:19:27] SECURITY[1303] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-06-03T10:19:27.789-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="newyork",SessionID="0x7f4d740397b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.171.144.195/42799",Challenge="6b87a5eb",ReceivedChallenge="6b87a5eb",ReceivedHash="da07f0664af2f6418fdb4f4b23c129ec"
[2020-06-03 10:20:50] NOTICE[1288] chan_sip.c: Registration from '' failed for '62.171.144.195:45822' - Wrong password
[2020-06-03 10:20:50] SECURITY[1303] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-06-03T10:20:50.639-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="soccer",SessionID="0x7f4d740436f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/
...
2020-06-03 22:24:46
182.121.173.136 attackbots
prod6
...
2020-06-03 22:12:22
106.12.38.109 attackbotsspam
Jun  3 14:05:43 srv-ubuntu-dev3 sshd[43138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.38.109  user=root
Jun  3 14:05:45 srv-ubuntu-dev3 sshd[43138]: Failed password for root from 106.12.38.109 port 41218 ssh2
Jun  3 14:07:06 srv-ubuntu-dev3 sshd[43348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.38.109  user=root
Jun  3 14:07:08 srv-ubuntu-dev3 sshd[43348]: Failed password for root from 106.12.38.109 port 57828 ssh2
Jun  3 14:08:30 srv-ubuntu-dev3 sshd[43552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.38.109  user=root
Jun  3 14:08:32 srv-ubuntu-dev3 sshd[43552]: Failed password for root from 106.12.38.109 port 46204 ssh2
Jun  3 14:09:50 srv-ubuntu-dev3 sshd[43735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.38.109  user=root
Jun  3 14:09:51 srv-ubuntu-dev3 sshd[43735]: Failed p
...
2020-06-03 22:27:08

Recently Reported IPs

5.133.121.25 14.222.195.13 77.220.195.150 128.199.94.140
110.86.160.69 35.245.120.99 34.147.7.80 192.241.212.141
192.241.217.121 111.67.196.38 2.55.115.132 95.211.162.42
95.217.129.44 34.83.85.238 222.91.148.96 87.236.176.175
78.164.54.164 159.65.115.17 60.161.249.36 183.230.184.84