Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Chicago

Region: Illinois

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.150.116.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18153
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;129.150.116.7.			IN	A

;; AUTHORITY SECTION:
.			239	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020042201 1800 900 604800 86400

;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 23 06:53:18 CST 2020
;; MSG SIZE  rcvd: 117
Host info
7.116.150.129.in-addr.arpa domain name pointer oc-129-150-116-7.compute.oraclecloud.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
7.116.150.129.in-addr.arpa	name = oc-129-150-116-7.compute.oraclecloud.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
200.71.72.14 attackspambots
Lines containing failures of 200.71.72.14
Dec 18 11:49:08 shared07 postfix/smtpd[27263]: connect from 200-71-72-14.rev.brasillike.com.br[200.71.72.14]
Dec 18 11:49:09 shared07 policyd-spf[28476]: prepend Received-SPF: Permerror (mailfrom) identhostnamey=mailfrom; client-ip=200.71.72.14; helo=200-71-72-201.rev.brasillike.com.br; envelope-from=x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=200.71.72.14
2019-12-22 05:52:37
157.55.39.34 attack
[Sat Dec 21 21:48:02.249177 2019] [ssl:info] [pid 31871:tid 139796756297472] [client 157.55.39.34:1858] AH02033: No hostname was provided via SNI for a name based virtual host
...
2019-12-22 05:56:43
37.49.231.102 attack
Automatic report - Banned IP Access
2019-12-22 06:05:19
177.129.184.31 attackspam
Unauthorized connection attempt detected from IP address 177.129.184.31 to port 445
2019-12-22 06:01:04
193.70.81.201 attackbotsspam
Invalid user holter from 193.70.81.201 port 49228
2019-12-22 06:29:10
14.177.136.221 attackbotsspam
1576939649 - 12/21/2019 15:47:29 Host: 14.177.136.221/14.177.136.221 Port: 445 TCP Blocked
2019-12-22 06:22:29
5.235.235.154 attackspambots
Unauthorized connection attempt detected from IP address 5.235.235.154 to port 445
2019-12-22 06:22:03
123.140.114.252 attack
Repeated brute force against a port
2019-12-22 06:16:02
36.155.115.95 attackbots
Invalid user myrn from 36.155.115.95 port 53191
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.115.95
Failed password for invalid user myrn from 36.155.115.95 port 53191 ssh2
Invalid user itachi from 36.155.115.95 port 47809
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.115.95
2019-12-22 06:30:53
185.246.211.67 attackbotsspam
abuse hacker
2019-12-22 06:18:45
51.254.206.149 attackbots
Dec 21 21:16:24 pornomens sshd\[25409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.206.149  user=root
Dec 21 21:16:27 pornomens sshd\[25409\]: Failed password for root from 51.254.206.149 port 59686 ssh2
Dec 21 21:41:02 pornomens sshd\[25770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.206.149  user=bin
...
2019-12-22 06:31:10
104.244.76.13 attackspambots
Automatic report - XMLRPC Attack
2019-12-22 06:24:09
165.231.253.74 attack
Dec 21 19:12:40 hcbbdb sshd\[11743\]: Invalid user 123456 from 165.231.253.74
Dec 21 19:12:40 hcbbdb sshd\[11743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.231.253.74
Dec 21 19:12:42 hcbbdb sshd\[11743\]: Failed password for invalid user 123456 from 165.231.253.74 port 39270 ssh2
Dec 21 19:19:07 hcbbdb sshd\[12455\]: Invalid user 123\$%\^ from 165.231.253.74
Dec 21 19:19:07 hcbbdb sshd\[12455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.231.253.74
2019-12-22 06:29:28
212.47.246.150 attackspam
Dec 21 22:18:10 pornomens sshd\[26220\]: Invalid user nordlund from 212.47.246.150 port 54830
Dec 21 22:18:10 pornomens sshd\[26220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.47.246.150
Dec 21 22:18:13 pornomens sshd\[26220\]: Failed password for invalid user nordlund from 212.47.246.150 port 54830 ssh2
...
2019-12-22 06:03:31
159.203.201.29 attackspam
Unauthorized connection attempt detected from IP address 159.203.201.29 to port 8443
2019-12-22 06:01:58

Recently Reported IPs

51.137.125.219 100.177.46.81 126.227.144.139 68.77.201.1
170.38.16.160 193.91.54.66 191.227.111.6 217.90.94.104
122.100.124.90 116.35.70.18 39.64.68.198 90.90.73.190
123.67.53.48 72.73.103.10 204.127.187.109 103.151.65.133
180.76.38.43 70.255.111.229 80.1.92.116 75.14.46.17