Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
129.205.136.30 attack
unauthorized connection attempt
2020-02-04 17:35:02
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.205.136.33
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.205.136.33.			IN	A

;; AUTHORITY SECTION:
.			530	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 04:46:14 CST 2022
;; MSG SIZE  rcvd: 107
Host info
33.136.205.129.in-addr.arpa domain name pointer 129-205-136-33.dynamic.macrolan.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
33.136.205.129.in-addr.arpa	name = 129-205-136-33.dynamic.macrolan.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
128.199.100.225 attackbots
Automatic report - Banned IP Access
2020-01-12 02:32:48
107.170.249.6 attackspam
Unauthorized connection attempt detected from IP address 107.170.249.6 to port 2220 [J]
2020-01-12 01:54:28
191.241.242.81 attackbotsspam
1578748088 - 01/11/2020 14:08:08 Host: 191.241.242.81/191.241.242.81 Port: 445 TCP Blocked
2020-01-12 02:31:24
128.140.138.202 attackbots
$f2bV_matches
2020-01-12 02:33:14
106.13.101.220 attackspam
Unauthorized connection attempt detected from IP address 106.13.101.220 to port 2220 [J]
2020-01-12 02:06:54
128.199.178.188 attack
Jan 11 18:25:13 hosting180 sshd[19415]: Invalid user vim from 128.199.178.188 port 47186
...
2020-01-12 02:22:42
218.92.0.158 attackbotsspam
Jan 11 19:11:18 nextcloud sshd\[6584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
Jan 11 19:11:20 nextcloud sshd\[6584\]: Failed password for root from 218.92.0.158 port 21770 ssh2
Jan 11 19:11:23 nextcloud sshd\[6584\]: Failed password for root from 218.92.0.158 port 21770 ssh2
...
2020-01-12 02:31:08
139.155.1.18 attackspam
Jan 11 19:06:10 master sshd[25189]: Failed password for invalid user jqc from 139.155.1.18 port 55034 ssh2
Jan 11 19:24:57 master sshd[25391]: Failed password for invalid user vsftpd from 139.155.1.18 port 59558 ssh2
Jan 11 19:29:57 master sshd[25430]: Failed password for root from 139.155.1.18 port 55180 ssh2
2020-01-12 01:59:23
129.211.16.236 attackbots
$f2bV_matches
2020-01-12 01:57:01
129.204.108.143 attackspambots
$f2bV_matches
2020-01-12 02:11:09
129.158.71.3 attack
20 attempts against mh-ssh on cloud.magehost.pro
2020-01-12 02:13:28
129.204.152.222 attackbotsspam
SSH Brute-Force reported by Fail2Ban
2020-01-12 02:09:27
128.199.144.173 attackspambots
$f2bV_matches
2020-01-12 02:26:23
157.230.153.75 attackspambots
$f2bV_matches
2020-01-12 01:56:41
128.199.162.143 attack
$f2bV_matches
2020-01-12 02:23:37

Recently Reported IPs

129.205.136.244 129.205.136.28 129.205.136.255 129.205.136.41
129.205.136.35 129.205.136.4 118.170.148.137 118.170.148.138
118.170.148.141 118.170.148.142 118.170.148.15 118.170.148.157
118.170.148.166 118.170.148.199 129.205.143.143 129.205.143.134
129.205.143.144 129.205.143.140 129.205.143.126 129.205.143.122