Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.21.144.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2572
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.21.144.212.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 07:42:53 CST 2025
;; MSG SIZE  rcvd: 107
Host info
212.144.21.129.in-addr.arpa domain name pointer laptop-psk0c741.wireless.rit.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
212.144.21.129.in-addr.arpa	name = laptop-psk0c741.wireless.rit.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
180.126.59.137 attack
Jul 30 13:42:36 vz239 sshd[20657]: Bad protocol version identification '' from 180.126.59.137
Jul 30 13:42:40 vz239 sshd[20660]: Invalid user osboxes from 180.126.59.137
Jul 30 13:42:41 vz239 sshd[20660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.126.59.137 
Jul 30 13:42:43 vz239 sshd[20660]: Failed password for invalid user osboxes from 180.126.59.137 port 44272 ssh2
Jul 30 13:42:43 vz239 sshd[20660]: Connection closed by 180.126.59.137 [preauth]
Jul 30 13:42:48 vz239 sshd[20664]: Invalid user support from 180.126.59.137
Jul 30 13:42:48 vz239 sshd[20664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.126.59.137 
Jul 30 13:42:50 vz239 sshd[20664]: Failed password for invalid user support from 180.126.59.137 port 46558 ssh2
Jul 30 13:42:51 vz239 sshd[20664]: Connection closed by 180.126.59.137 [preauth]
Jul 30 13:42:55 vz239 sshd[20666]: Invalid user NetLinx from 180.126.59.13........
-------------------------------
2019-07-31 06:05:42
1.53.142.53 attackbots
Spam Timestamp : 30-Jul-19 12:26 _ BlockList Provider  combined abuse _ (834)
2019-07-31 06:06:33
117.93.63.199 attackspambots
Automatic report - Port Scan Attack
2019-07-31 06:09:04
151.236.34.18 attack
Automatic report - SSH Brute-Force Attack
2019-07-31 05:45:28
119.50.22.219 attackbots
23/tcp
[2019-07-30]1pkt
2019-07-31 05:47:19
113.253.238.232 attackbots
5555/tcp
[2019-07-30]1pkt
2019-07-31 05:54:49
151.236.10.54 attack
SSH/22 MH Probe, BF, Hack -
2019-07-31 05:40:05
162.241.200.175 attackbots
WordPress brute force
2019-07-31 06:10:57
175.23.23.187 attackbotsspam
52869/tcp
[2019-07-30]1pkt
2019-07-31 05:58:15
113.105.223.90 attackbotsspam
445/tcp
[2019-07-30]1pkt
2019-07-31 06:03:35
181.88.233.53 attack
23/tcp
[2019-07-30]1pkt
2019-07-31 06:08:08
39.105.155.250 attack
8545/tcp
[2019-07-30]1pkt
2019-07-31 06:12:42
49.83.38.231 attack
Automatic report - Port Scan Attack
2019-07-31 06:31:22
45.58.55.104 attackspambots
Jul 30 07:57:22 ACSRAD auth.info sshd[11401]: Invalid user rat from 45.58.55.104 port 36862
Jul 30 07:57:22 ACSRAD auth.info sshd[11401]: Failed password for invalid user rat from 45.58.55.104 port 36862 ssh2
Jul 30 07:57:22 ACSRAD auth.info sshd[11401]: Received disconnect from 45.58.55.104 port 36862:11: Bye Bye [preauth]
Jul 30 07:57:22 ACSRAD auth.notice sshguard[31199]: Attack from "45.58.55.104" on service 100 whostnameh danger 10.
Jul 30 07:57:22 ACSRAD auth.notice sshguard[31199]: Attack from "45.58.55.104" on service 100 whostnameh danger 10.
Jul 30 07:57:22 ACSRAD auth.notice sshguard[31199]: Attack from "45.58.55.104" on service 100 whostnameh danger 10.
Jul 30 07:57:22 ACSRAD auth.warn sshguard[31199]: Blocking "45.58.55.104/32" for 120 secs (3 attacks in 0 secs, after 1 abuses over 0 secs.)
Jul 30 07:57:22 ACSRAD auth.info sshd[11401]: Disconnected from 45.58.55.104 port 36862 [preauth]
Jul 30 08:02:59 ACSRAD auth.info sshd[14649]: Invalid user ze from 45.58........
------------------------------
2019-07-31 06:32:21
213.55.95.150 attackspambots
Unauthorised access (Jul 30) SRC=213.55.95.150 LEN=52 TTL=112 ID=6749 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-31 06:04:22

Recently Reported IPs

94.218.96.47 5.185.68.245 173.171.79.172 25.218.133.173
29.59.152.23 123.210.43.19 166.102.57.160 104.132.51.177
86.110.229.252 132.194.120.248 191.166.242.77 70.40.165.152
5.127.200.245 255.41.187.49 129.140.189.127 83.2.220.115
15.240.60.109 161.129.29.222 119.250.225.142 50.30.118.159