Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Rochester

Region: New York

Country: United States

Internet Service Provider: Rochester Institute of Technology

Hostname: unknown

Organization: Rochester Institute of Technology

Usage Type: University/College/School

Comments:
Type Details Datetime
attackspambots
SSH/22 MH Probe, BF, Hack -
2019-07-29 23:48:22
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.21.149.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49155
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;129.21.149.97.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072900 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 29 23:48:07 CST 2019
;; MSG SIZE  rcvd: 117
Host info
97.149.21.129.in-addr.arpa domain name pointer gwc.student.rit.edu.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
97.149.21.129.in-addr.arpa	name = gwc.student.rit.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
71.95.243.20 attackbotsspam
Invalid user sageng from 71.95.243.20 port 35558
2020-02-13 17:47:46
202.152.0.14 attackspambots
$f2bV_matches
2020-02-13 18:32:34
177.93.70.178 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2020-02-13 18:04:58
49.231.201.146 attack
20/2/12@23:48:23: FAIL: Alarm-Network address from=49.231.201.146
20/2/12@23:48:23: FAIL: Alarm-Network address from=49.231.201.146
...
2020-02-13 18:33:00
51.255.170.213 attackspam
ZTE Router Exploit Scanner
2020-02-13 18:04:24
110.78.168.25 attack
Feb 13 05:48:18 [host] sshd[28679]: Invalid user n
Feb 13 05:48:20 [host] sshd[28679]: pam_unix(sshd:
Feb 13 05:48:21 [host] sshd[28679]: Failed passwor
2020-02-13 18:33:49
113.175.33.30 attack
20/2/12@23:48:26: FAIL: Alarm-Network address from=113.175.33.30
...
2020-02-13 18:30:27
124.250.58.2 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-13 18:15:38
112.198.194.11 attack
Fail2Ban Ban Triggered
2020-02-13 17:58:23
89.252.155.80 attack
Feb 12 19:13:53 sachi sshd\[5254\]: Invalid user dmuser_57 from 89.252.155.80
Feb 12 19:13:53 sachi sshd\[5254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.252.155.80
Feb 12 19:13:55 sachi sshd\[5254\]: Failed password for invalid user dmuser_57 from 89.252.155.80 port 59758 ssh2
Feb 12 19:16:48 sachi sshd\[5564\]: Invalid user doja002 from 89.252.155.80
Feb 12 19:16:48 sachi sshd\[5564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.252.155.80
2020-02-13 18:11:41
114.119.10.171 attackbotsspam
Brute force attempt
2020-02-13 18:14:51
1.47.74.156 attack
1581569361 - 02/13/2020 05:49:21 Host: 1.47.74.156/1.47.74.156 Port: 445 TCP Blocked
2020-02-13 17:49:39
142.93.15.179 attackbots
$f2bV_matches
2020-02-13 17:49:55
181.229.255.114 attackbotsspam
SSH invalid-user multiple login try
2020-02-13 17:40:10
207.46.13.96 attackbots
Automatic report - Banned IP Access
2020-02-13 18:08:06

Recently Reported IPs

187.73.173.176 178.93.38.117 220.199.77.45 237.226.132.223
129.213.58.226 165.229.238.141 128.92.150.18 115.79.88.79
87.76.33.44 181.210.4.176 4.91.203.189 223.45.158.39
27.158.48.74 49.83.118.120 155.52.78.145 191.112.175.34
24.215.123.121 138.189.9.46 65.124.94.138 46.144.191.181