Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ashburn

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.153.40.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46345
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.153.40.245.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025070101 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jul 02 02:32:25 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 245.40.153.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 245.40.153.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
221.132.17.74 attack
Oct  1 00:57:19 bouncer sshd\[24610\]: Invalid user aracsm from 221.132.17.74 port 38104
Oct  1 00:57:19 bouncer sshd\[24610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.132.17.74 
Oct  1 00:57:21 bouncer sshd\[24610\]: Failed password for invalid user aracsm from 221.132.17.74 port 38104 ssh2
...
2019-10-01 07:59:01
101.207.134.63 attackspam
SSH Brute Force, server-1 sshd[19286]: Failed password for invalid user toor from 101.207.134.63 port 49669 ssh2
2019-10-01 07:42:53
91.121.157.83 attack
Oct  1 01:42:02 SilenceServices sshd[30304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.157.83
Oct  1 01:42:04 SilenceServices sshd[30304]: Failed password for invalid user externo from 91.121.157.83 port 57832 ssh2
Oct  1 01:45:29 SilenceServices sshd[31243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.157.83
2019-10-01 07:46:49
111.241.60.95 attackbots
Port scan
2019-10-01 08:03:11
142.93.238.162 attack
Sep 30 13:49:23 friendsofhawaii sshd\[11419\]: Invalid user admin from 142.93.238.162
Sep 30 13:49:23 friendsofhawaii sshd\[11419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.238.162
Sep 30 13:49:26 friendsofhawaii sshd\[11419\]: Failed password for invalid user admin from 142.93.238.162 port 34418 ssh2
Sep 30 13:53:31 friendsofhawaii sshd\[11790\]: Invalid user iy from 142.93.238.162
Sep 30 13:53:31 friendsofhawaii sshd\[11790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.238.162
2019-10-01 08:00:13
220.120.106.254 attack
Oct  1 01:46:47 dedicated sshd[3198]: Failed password for invalid user test from 220.120.106.254 port 40210 ssh2
Oct  1 01:46:44 dedicated sshd[3198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.120.106.254
Oct  1 01:46:44 dedicated sshd[3198]: Invalid user test from 220.120.106.254 port 40210
Oct  1 01:46:47 dedicated sshd[3198]: Failed password for invalid user test from 220.120.106.254 port 40210 ssh2
Oct  1 01:50:46 dedicated sshd[3800]: Invalid user qg from 220.120.106.254 port 55696
2019-10-01 07:53:34
54.37.71.235 attackspambots
Oct  1 02:49:19 www2 sshd\[31909\]: Invalid user support from 54.37.71.235Oct  1 02:49:21 www2 sshd\[31909\]: Failed password for invalid user support from 54.37.71.235 port 36550 ssh2Oct  1 02:54:31 www2 sshd\[32471\]: Invalid user aaa from 54.37.71.235
...
2019-10-01 07:55:49
218.148.239.169 attackbotsspam
Sep 30 13:26:37 auw2 sshd\[23112\]: Invalid user castis from 218.148.239.169
Sep 30 13:26:37 auw2 sshd\[23112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.148.239.169
Sep 30 13:26:39 auw2 sshd\[23112\]: Failed password for invalid user castis from 218.148.239.169 port 33568 ssh2
Sep 30 13:35:32 auw2 sshd\[23872\]: Invalid user vps from 218.148.239.169
Sep 30 13:35:32 auw2 sshd\[23872\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.148.239.169
2019-10-01 07:57:17
35.232.167.161 attackspam
(sshd) Failed SSH login from 35.232.167.161 (US/United States/Virginia/-/161.167.232.35.bc.googleusercontent.com/[AS15169 Google LLC]): 1 in the last 3600 secs
2019-10-01 08:10:43
45.136.109.194 attack
firewall-block, port(s): 598/tcp, 668/tcp, 920/tcp, 1297/tcp
2019-10-01 08:07:43
94.177.246.39 attack
$f2bV_matches
2019-10-01 08:12:39
85.86.181.116 attack
Oct  1 00:39:24 pkdns2 sshd\[64785\]: Invalid user vh from 85.86.181.116Oct  1 00:39:26 pkdns2 sshd\[64785\]: Failed password for invalid user vh from 85.86.181.116 port 46968 ssh2Oct  1 00:43:49 pkdns2 sshd\[65024\]: Invalid user luce from 85.86.181.116Oct  1 00:43:50 pkdns2 sshd\[65024\]: Failed password for invalid user luce from 85.86.181.116 port 43732 ssh2Oct  1 00:48:01 pkdns2 sshd\[65235\]: Invalid user marthe from 85.86.181.116Oct  1 00:48:02 pkdns2 sshd\[65235\]: Failed password for invalid user marthe from 85.86.181.116 port 40486 ssh2
...
2019-10-01 07:50:42
222.186.42.4 attack
Sep 30 19:37:33 ny01 sshd[12470]: Failed password for root from 222.186.42.4 port 45672 ssh2
Sep 30 19:37:45 ny01 sshd[12470]: Failed password for root from 222.186.42.4 port 45672 ssh2
Sep 30 19:37:49 ny01 sshd[12470]: Failed password for root from 222.186.42.4 port 45672 ssh2
Sep 30 19:37:49 ny01 sshd[12470]: error: maximum authentication attempts exceeded for root from 222.186.42.4 port 45672 ssh2 [preauth]
2019-10-01 07:44:37
51.75.70.159 attack
Sep 30 18:29:29 Tower sshd[615]: Connection from 51.75.70.159 port 50174 on 192.168.10.220 port 22
Sep 30 18:29:30 Tower sshd[615]: Invalid user alexandria from 51.75.70.159 port 50174
Sep 30 18:29:30 Tower sshd[615]: error: Could not get shadow information for NOUSER
Sep 30 18:29:30 Tower sshd[615]: Failed password for invalid user alexandria from 51.75.70.159 port 50174 ssh2
Sep 30 18:29:30 Tower sshd[615]: Received disconnect from 51.75.70.159 port 50174:11: Bye Bye [preauth]
Sep 30 18:29:30 Tower sshd[615]: Disconnected from invalid user alexandria 51.75.70.159 port 50174 [preauth]
2019-10-01 08:17:53
103.137.184.46 attackspambots
WordPress wp-login brute force :: 103.137.184.46 0.204 BYPASS [01/Oct/2019:06:55:56  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-01 07:54:32

Recently Reported IPs

176.65.148.183 134.88.83.131 119.28.136.170 117.10.86.37
11.95.85.153 107.73.1.162 110.155.177.253 114.193.120.182
111.55.102.187 108.88.60.126 105.190.251.97 105.140.176.29
8.219.209.185 78.75.62.218 178.62.26.12 74.235.185.122
162.107.0.166 190.101.24.237 43.178.150.9 222.247.15.200