Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lagos

Region: Lagos

Country: Nigeria

Internet Service Provider: Swift

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.18.198.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7320
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.18.198.71.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121400 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 14 14:41:54 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 71.198.18.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
server can't find 129.18.198.71.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
211.54.40.81 attackbotsspam
Aug 17 04:36:50 debian sshd\[4967\]: Invalid user zabbix from 211.54.40.81 port 38423
Aug 17 04:36:50 debian sshd\[4967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.54.40.81
...
2019-08-17 11:54:11
49.88.226.196 attackbots
SpamReport
2019-08-17 11:51:22
185.139.21.21 attack
Tried sshing with brute force.
2019-08-17 12:02:33
60.212.42.56 attackbots
'IP reached maximum auth failures for a one day block'
2019-08-17 11:31:31
104.199.174.103 attackspambots
Automatic report - Banned IP Access
2019-08-17 11:33:38
111.67.205.202 attack
Automatic report - Banned IP Access
2019-08-17 12:03:00
109.70.100.21 attack
Unauthorized access detected from banned ip
2019-08-17 11:43:55
104.248.211.180 attackbots
Aug 17 03:24:47 MK-Soft-VM3 sshd\[29937\]: Invalid user support from 104.248.211.180 port 40322
Aug 17 03:24:47 MK-Soft-VM3 sshd\[29937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.211.180
Aug 17 03:24:49 MK-Soft-VM3 sshd\[29937\]: Failed password for invalid user support from 104.248.211.180 port 40322 ssh2
...
2019-08-17 11:41:33
188.93.75.134 attackspambots
Probing for vulnerable PHP code /7jkpdo76.php
2019-08-17 11:21:29
59.124.85.195 attack
SSH Brute Force, server-1 sshd[12123]: Failed password for invalid user oracle from 59.124.85.195 port 58684 ssh2
2019-08-17 11:47:14
124.217.247.142 attack
WordPress brute force
2019-08-17 11:24:16
185.227.68.78 attack
Unauthorized SSH login attempts
2019-08-17 11:48:41
78.186.208.216 attackspambots
Aug 17 03:09:50 XXX sshd[31755]: Invalid user sn from 78.186.208.216 port 44072
2019-08-17 11:59:17
138.128.212.90 attack
2019-08-16T22:56:12.961065abusebot-8.cloudsearch.cf sshd\[24953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.128.212.90.16clouds.com  user=root
2019-08-17 11:38:38
124.156.187.94 attack
Aug 17 05:07:49 OPSO sshd\[1222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.187.94  user=root
Aug 17 05:07:52 OPSO sshd\[1222\]: Failed password for root from 124.156.187.94 port 51980 ssh2
Aug 17 05:13:06 OPSO sshd\[2211\]: Invalid user wh from 124.156.187.94 port 44006
Aug 17 05:13:06 OPSO sshd\[2211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.187.94
Aug 17 05:13:08 OPSO sshd\[2211\]: Failed password for invalid user wh from 124.156.187.94 port 44006 ssh2
2019-08-17 11:53:18

Recently Reported IPs

70.98.251.249 42.16.149.75 233.77.39.109 226.11.70.34
123.125.229.174 139.71.101.113 33.97.89.74 30.65.179.166
149.15.23.5 40.215.4.83 221.225.75.202 12.9.100.127
138.100.220.61 13.148.223.28 21.255.146.59 148.32.250.143
208.118.246.244 21.26.86.28 192.7.131.96 119.21.152.208