Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.149.172.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1668
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.149.172.147.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 23:50:37 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 147.172.149.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.172.149.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.118.144.31 attack
2019-10-01 08:59:10,843 fail2ban.actions        [818]: NOTICE  [sshd] Ban 45.118.144.31
2019-10-01 12:04:37,217 fail2ban.actions        [818]: NOTICE  [sshd] Ban 45.118.144.31
2019-10-01 15:14:10,547 fail2ban.actions        [818]: NOTICE  [sshd] Ban 45.118.144.31
...
2019-10-02 05:05:29
51.38.68.83 attackbotsspam
WordPress wp-login brute force :: 51.38.68.83 0.044 BYPASS [02/Oct/2019:07:05:39  1000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-02 05:22:10
180.242.158.107 attackspam
WordPress wp-login brute force :: 180.242.158.107 0.192 BYPASS [02/Oct/2019:07:05:40  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-02 05:21:51
104.220.155.248 attackspam
Oct  1 17:05:54 plusreed sshd[1097]: Invalid user vyatta from 104.220.155.248
...
2019-10-02 05:10:05
123.207.2.120 attackspam
Oct  1 11:18:06 web9 sshd\[31221\]: Invalid user ulva from 123.207.2.120
Oct  1 11:18:06 web9 sshd\[31221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.2.120
Oct  1 11:18:09 web9 sshd\[31221\]: Failed password for invalid user ulva from 123.207.2.120 port 36788 ssh2
Oct  1 11:22:25 web9 sshd\[32042\]: Invalid user ida from 123.207.2.120
Oct  1 11:22:25 web9 sshd\[32042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.2.120
2019-10-02 05:38:37
61.92.169.178 attackbotsspam
Oct  1 21:05:49 anodpoucpklekan sshd[61420]: Invalid user yf from 61.92.169.178 port 58412
Oct  1 21:05:51 anodpoucpklekan sshd[61420]: Failed password for invalid user yf from 61.92.169.178 port 58412 ssh2
...
2019-10-02 05:12:49
95.238.211.79 attackbotsspam
BURG,WP GET /wp-login.php
2019-10-02 05:44:06
14.2.168.203 attackbotsspam
2019-10-01T21:00:40.032207shield sshd\[21459\]: Invalid user dorine from 14.2.168.203 port 52434
2019-10-01T21:00:40.036726shield sshd\[21459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.2.168.203
2019-10-01T21:00:42.603235shield sshd\[21459\]: Failed password for invalid user dorine from 14.2.168.203 port 52434 ssh2
2019-10-01T21:05:40.443535shield sshd\[22293\]: Invalid user csgo from 14.2.168.203 port 44431
2019-10-01T21:05:40.447592shield sshd\[22293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.2.168.203
2019-10-02 05:22:28
51.83.74.45 attackspambots
Oct  1 23:05:14 ArkNodeAT sshd\[32678\]: Invalid user kaleshamd from 51.83.74.45
Oct  1 23:05:14 ArkNodeAT sshd\[32678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.74.45
Oct  1 23:05:16 ArkNodeAT sshd\[32678\]: Failed password for invalid user kaleshamd from 51.83.74.45 port 56824 ssh2
2019-10-02 05:27:18
112.132.89.81 attackspam
Oct  1 23:04:53 MK-Soft-VM4 sshd[2242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.132.89.81 
Oct  1 23:04:55 MK-Soft-VM4 sshd[2242]: Failed password for invalid user user from 112.132.89.81 port 59948 ssh2
...
2019-10-02 05:43:45
46.38.144.17 attack
Oct  1 23:23:32 webserver postfix/smtpd\[30462\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  1 23:24:49 webserver postfix/smtpd\[30462\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  1 23:26:06 webserver postfix/smtpd\[31776\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  1 23:27:23 webserver postfix/smtpd\[30462\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  1 23:28:39 webserver postfix/smtpd\[30462\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-10-02 05:32:56
104.238.127.108 attackspam
WordPress wp-login brute force :: 104.238.127.108 0.052 BYPASS [02/Oct/2019:07:05:38  1000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-02 05:23:39
58.175.144.110 attackbots
2019-10-01T21:05:46.696485abusebot-5.cloudsearch.cf sshd\[12602\]: Invalid user user from 58.175.144.110 port 57156
2019-10-02 05:16:03
5.51.166.164 attack
Oct  1 23:05:44 tor-proxy-02 sshd\[22035\]: Invalid user pi from 5.51.166.164 port 39108
Oct  1 23:05:44 tor-proxy-02 sshd\[22035\]: Connection closed by 5.51.166.164 port 39108 \[preauth\]
Oct  1 23:05:44 tor-proxy-02 sshd\[22037\]: Invalid user pi from 5.51.166.164 port 39110
...
2019-10-02 05:20:38
27.154.101.140 attackspambots
RDP brute force attack detected by fail2ban
2019-10-02 05:14:36

Recently Reported IPs

197.118.175.60 83.87.187.102 151.115.226.232 82.112.83.125
38.85.233.203 209.62.180.106 99.103.3.53 115.167.235.174
81.176.107.148 50.19.52.238 241.162.247.109 58.159.22.111
63.82.140.243 255.245.224.140 44.127.57.22 149.120.183.228
148.157.94.59 254.207.85.101 214.113.57.49 147.108.60.83