Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Genève

Region: Geneva

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.194.133.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54054
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.194.133.148.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010602 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 07 11:57:33 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 148.133.194.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.133.194.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
140.143.93.31 attack
DATE:2020-05-02 00:57:36, IP:140.143.93.31, PORT:ssh SSH brute force auth (docker-dc)
2020-05-02 07:01:27
222.223.101.58 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-05-02 07:20:13
223.197.151.55 attack
SSH Invalid Login
2020-05-02 07:05:39
190.228.227.232 attackspam
trying to access non-authorized port
2020-05-02 07:26:52
51.77.212.235 attackspam
Invalid user alexander from 51.77.212.235 port 58614
2020-05-02 07:19:41
45.185.144.251 attackspam
Automatic report - Port Scan Attack
2020-05-02 07:02:49
198.27.122.201 attackbotsspam
Invalid user sirius from 198.27.122.201 port 47384
2020-05-02 07:32:14
195.54.167.16 attack
May  2 00:47:19 debian-2gb-nbg1-2 kernel: \[10632150.422010\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.167.16 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=46462 PROTO=TCP SPT=51433 DPT=23345 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-02 07:03:54
190.218.101.75 attack
Attempted connection to port 5555.
2020-05-02 07:08:27
159.89.133.144 attackspam
Invalid user george from 159.89.133.144 port 59918
2020-05-02 07:30:00
181.209.82.154 attackbots
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-05-02 07:35:58
45.230.241.142 attackbotsspam
Attempted connection to port 445.
2020-05-02 07:07:30
110.185.104.126 attack
Invalid user stagiaire from 110.185.104.126 port 52177
2020-05-02 07:24:32
68.4.194.221 attackbots
May  2 00:20:10 debian64 sshd[8100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.4.194.221 
May  2 00:20:12 debian64 sshd[8100]: Failed password for invalid user odroid from 68.4.194.221 port 39282 ssh2
...
2020-05-02 07:14:55
5.132.115.161 attackspam
Invalid user student from 5.132.115.161 port 58026
2020-05-02 07:00:06

Recently Reported IPs

82.84.236.142 66.91.48.102 64.144.86.164 7.246.201.171
80.119.61.133 50.178.152.105 182.160.7.205 82.219.240.163
143.71.58.78 140.120.102.57 239.199.228.34 234.52.111.165
81.132.151.54 66.83.16.223 156.141.100.146 169.140.73.191
9.4.245.226 155.18.2.146 35.205.150.57 136.4.64.205