Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.196.64.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39807
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.196.64.159.			IN	A

;; AUTHORITY SECTION:
.			203	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 03:46:37 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 159.64.196.129.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 159.64.196.129.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
113.141.70.119 attackspam
Unauthorised access (Nov 27) SRC=113.141.70.119 LEN=40 TTL=239 ID=10096 TCP DPT=445 WINDOW=1024 SYN
2019-11-28 06:44:00
177.6.64.162 attack
Unauthorized connection attempt from IP address 177.6.64.162 on Port 445(SMB)
2019-11-28 06:33:15
188.138.129.172 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-28 07:01:27
188.131.200.191 attackbots
Nov 27 22:14:52 pornomens sshd\[27456\]: Invalid user user3 from 188.131.200.191 port 33121
Nov 27 22:14:52 pornomens sshd\[27456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.200.191
Nov 27 22:14:54 pornomens sshd\[27456\]: Failed password for invalid user user3 from 188.131.200.191 port 33121 ssh2
...
2019-11-28 06:32:54
91.219.140.168 attackspambots
Port 1433 Scan
2019-11-28 06:35:16
151.80.195.3 attackspambots
11/27/2019-15:45:51.951305 151.80.195.3 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-28 06:40:09
177.11.44.209 attackspambots
Nov 27 15:40:10 uapps sshd[21164]: Address 177.11.44.209 maps to 177-11-44-209.virt.com.br, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Nov 27 15:40:10 uapps sshd[21164]: User r.r from 177.11.44.209 not allowed because not listed in AllowUsers
Nov 27 15:40:10 uapps sshd[21164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.11.44.209  user=r.r
Nov 27 15:40:12 uapps sshd[21164]: Failed password for invalid user r.r from 177.11.44.209 port 33364 ssh2
Nov 27 15:40:14 uapps sshd[21164]: Failed password for invalid user r.r from 177.11.44.209 port 33364 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=177.11.44.209
2019-11-28 06:38:17
165.22.148.76 attackbotsspam
Nov 27 12:45:26 auw2 sshd\[22113\]: Invalid user bretoi from 165.22.148.76
Nov 27 12:45:26 auw2 sshd\[22113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.148.76
Nov 27 12:45:28 auw2 sshd\[22113\]: Failed password for invalid user bretoi from 165.22.148.76 port 50442 ssh2
Nov 27 12:51:38 auw2 sshd\[22622\]: Invalid user lisa from 165.22.148.76
Nov 27 12:51:38 auw2 sshd\[22622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.148.76
2019-11-28 06:58:45
186.103.204.122 attackspam
Unauthorized connection attempt from IP address 186.103.204.122 on Port 445(SMB)
2019-11-28 06:27:21
5.189.141.4 attackbotsspam
[portscan] Port scan
2019-11-28 06:56:59
117.3.70.114 attackspambots
Unauthorized connection attempt from IP address 117.3.70.114 on Port 445(SMB)
2019-11-28 06:47:32
201.90.233.245 attackbots
Unauthorized connection attempt from IP address 201.90.233.245 on Port 445(SMB)
2019-11-28 06:23:37
112.85.42.175 attack
SSH Bruteforce attempt
2019-11-28 06:24:53
220.132.28.238 attack
Unauthorized connection attempt from IP address 220.132.28.238 on Port 445(SMB)
2019-11-28 06:50:24
89.106.107.86 attack
UTC: 2019-11-26 port: 23/tcp
2019-11-28 06:44:46

Recently Reported IPs

114.181.25.89 212.186.190.252 111.69.1.130 118.77.147.110
197.119.190.104 104.167.7.137 52.24.213.207 126.80.217.236
159.129.99.157 195.26.116.131 154.205.215.166 135.51.148.221
198.12.249.167 36.11.82.169 24.162.19.76 102.63.90.128
152.62.253.241 155.55.93.100 136.225.91.241 101.139.43.0