Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.148.107.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25256
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.148.107.172.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 18:05:12 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 172.107.148.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 172.107.148.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.30.167 attack
Feb  2 09:58:34 MK-Soft-VM6 sshd[12282]: Failed password for root from 222.186.30.167 port 17225 ssh2
Feb  2 09:58:38 MK-Soft-VM6 sshd[12282]: Failed password for root from 222.186.30.167 port 17225 ssh2
...
2020-02-02 16:59:25
95.222.131.149 attack
Feb  1 19:38:19 php1 sshd\[21271\]: Invalid user vnc from 95.222.131.149
Feb  1 19:38:19 php1 sshd\[21271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.222.131.149
Feb  1 19:38:21 php1 sshd\[21271\]: Failed password for invalid user vnc from 95.222.131.149 port 54314 ssh2
Feb  1 19:46:15 php1 sshd\[21426\]: Invalid user testing from 95.222.131.149
Feb  1 19:46:15 php1 sshd\[21426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.222.131.149
2020-02-02 16:49:07
138.186.63.73 attackspambots
Invalid user admin from 138.186.63.73 port 41952
2020-02-02 16:47:20
59.149.138.52 attack
unauthorized connection attempt
2020-02-02 16:50:13
139.59.7.177 attack
Unauthorized connection attempt detected from IP address 139.59.7.177 to port 2220 [J]
2020-02-02 17:02:16
198.199.97.155 attackbots
2020-02-02T08:38:18.776200homeassistant sshd[26559]: Invalid user hadoop from 198.199.97.155 port 49987
2020-02-02T08:38:18.783140homeassistant sshd[26559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.97.155
...
2020-02-02 16:54:37
202.249.25.10 attackspam
Unauthorized connection attempt detected from IP address 202.249.25.10 to port 2220 [J]
2020-02-02 17:10:28
49.164.50.252 attack
Unauthorized connection attempt detected from IP address 49.164.50.252 to port 2220 [J]
2020-02-02 17:19:20
52.138.9.24 attack
CA Canada - Failures: 5 smtpauth
2020-02-02 17:04:44
62.215.128.61 attackspambots
20/2/1@23:53:59: FAIL: Alarm-Network address from=62.215.128.61
...
2020-02-02 17:06:44
73.57.162.98 attack
Unauthorized connection attempt detected from IP address 73.57.162.98 to port 8080 [J]
2020-02-02 17:07:16
64.190.205.74 attackbots
Unauthorized connection attempt detected from IP address 64.190.205.74 to port 2220 [J]
2020-02-02 17:18:49
185.175.93.14 attackspam
Fail2Ban Ban Triggered
2020-02-02 17:06:05
62.234.68.246 attackbots
Unauthorized connection attempt detected from IP address 62.234.68.246 to port 2220 [J]
2020-02-02 17:19:02
159.89.190.254 attackspambots
$f2bV_matches
2020-02-02 17:09:54

Recently Reported IPs

124.41.36.138 29.6.109.33 139.236.32.123 67.195.189.49
45.136.242.2 251.199.83.113 51.165.181.105 251.112.69.179
157.240.102.106 19.14.242.168 213.198.74.43 202.15.100.25
253.29.54.68 210.124.164.61 167.61.141.209 32.249.186.222
190.141.201.109 178.107.82.57 85.142.8.35 253.157.233.253