Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.213.136.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51522
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.213.136.252.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 14:31:13 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 252.136.213.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 252.136.213.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
34.90.70.182 attack
(smtpauth) Failed SMTP AUTH login from 34.90.70.182 (US/United States/182.70.90.34.bc.googleusercontent.com): 5 in the last 3600 secs
2019-09-11 19:38:27
185.129.62.62 attackspam
SSH Brute-Forcing (ownc)
2019-09-11 19:33:40
159.65.159.178 attackbots
Sep 11 01:23:20 friendsofhawaii sshd\[9612\]: Invalid user p@ssw0rd from 159.65.159.178
Sep 11 01:23:20 friendsofhawaii sshd\[9612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.159.178
Sep 11 01:23:23 friendsofhawaii sshd\[9612\]: Failed password for invalid user p@ssw0rd from 159.65.159.178 port 34360 ssh2
Sep 11 01:29:31 friendsofhawaii sshd\[10151\]: Invalid user oracle123 from 159.65.159.178
Sep 11 01:29:31 friendsofhawaii sshd\[10151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.159.178
2019-09-11 19:39:03
77.232.62.34 attackspambots
Sep 11 09:54:46 v22019058497090703 sshd[4744]: Failed password for root from 77.232.62.34 port 46313 ssh2
Sep 11 09:54:49 v22019058497090703 sshd[4744]: Failed password for root from 77.232.62.34 port 46313 ssh2
Sep 11 09:54:52 v22019058497090703 sshd[4744]: Failed password for root from 77.232.62.34 port 46313 ssh2
Sep 11 09:54:55 v22019058497090703 sshd[4744]: Failed password for root from 77.232.62.34 port 46313 ssh2
...
2019-09-11 19:26:21
111.230.249.77 attackspam
2019-09-11T08:26:20.592919abusebot-7.cloudsearch.cf sshd\[13983\]: Invalid user passw0rd from 111.230.249.77 port 53384
2019-09-11 19:25:38
82.129.131.170 attackbotsspam
Sep 11 13:09:53 ArkNodeAT sshd\[5502\]: Invalid user user from 82.129.131.170
Sep 11 13:09:53 ArkNodeAT sshd\[5502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.129.131.170
Sep 11 13:09:56 ArkNodeAT sshd\[5502\]: Failed password for invalid user user from 82.129.131.170 port 55434 ssh2
2019-09-11 19:37:01
182.18.188.132 attack
Sep 11 09:41:27 server sshd[24737]: Failed password for invalid user user21 from 182.18.188.132 port 58934 ssh2
Sep 11 09:49:14 server sshd[26056]: Failed password for invalid user teamspeak from 182.18.188.132 port 49306 ssh2
Sep 11 09:54:54 server sshd[26776]: Failed password for invalid user test1 from 182.18.188.132 port 49134 ssh2
2019-09-11 19:26:55
192.99.68.159 attack
Reported by AbuseIPDB proxy server.
2019-09-11 18:17:06
118.126.105.75 attackbots
Sep 11 00:05:49 hiderm sshd\[11421\]: Invalid user test from 118.126.105.75
Sep 11 00:05:49 hiderm sshd\[11421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.105.75
Sep 11 00:05:51 hiderm sshd\[11421\]: Failed password for invalid user test from 118.126.105.75 port 10813 ssh2
Sep 11 00:10:15 hiderm sshd\[11915\]: Invalid user mailserver from 118.126.105.75
Sep 11 00:10:15 hiderm sshd\[11915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.105.75
2019-09-11 18:15:35
118.98.121.195 attackspam
Sep 11 08:47:51 localhost sshd\[105317\]: Invalid user oracle from 118.98.121.195 port 60108
Sep 11 08:47:51 localhost sshd\[105317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.98.121.195
Sep 11 08:47:53 localhost sshd\[105317\]: Failed password for invalid user oracle from 118.98.121.195 port 60108 ssh2
Sep 11 08:55:18 localhost sshd\[105594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.98.121.195  user=mysql
Sep 11 08:55:20 localhost sshd\[105594\]: Failed password for mysql from 118.98.121.195 port 36710 ssh2
...
2019-09-11 19:18:38
27.111.85.60 attackbotsspam
Sep 11 10:52:13 hb sshd\[2765\]: Invalid user speedtest from 27.111.85.60
Sep 11 10:52:13 hb sshd\[2765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.111.85.60
Sep 11 10:52:15 hb sshd\[2765\]: Failed password for invalid user speedtest from 27.111.85.60 port 58205 ssh2
Sep 11 10:59:41 hb sshd\[3512\]: Invalid user 123qwe from 27.111.85.60
Sep 11 10:59:41 hb sshd\[3512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.111.85.60
2019-09-11 19:01:58
0.0.0.81 attackbots
pfaffenroth-photographie.de 2404:f080:1101:320:150:95:108:81 \[11/Sep/2019:09:56:08 +0200\] "POST /wp-login.php HTTP/1.1" 200 6694 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
pfaffenroth-photographie.de 2404:f080:1101:320:150:95:108:81 \[11/Sep/2019:09:56:12 +0200\] "POST /wp-login.php HTTP/1.1" 200 6705 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-09-11 18:10:42
52.28.27.251 attackbotsspam
SSH authentication failure x 6 reported by Fail2Ban
...
2019-09-11 19:27:31
210.51.161.210 attackspam
Sep 11 10:59:18 MK-Soft-VM5 sshd\[32207\]: Invalid user server1 from 210.51.161.210 port 40214
Sep 11 10:59:18 MK-Soft-VM5 sshd\[32207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.51.161.210
Sep 11 10:59:20 MK-Soft-VM5 sshd\[32207\]: Failed password for invalid user server1 from 210.51.161.210 port 40214 ssh2
...
2019-09-11 19:30:59
123.142.29.76 attack
Sep 11 07:02:55 TORMINT sshd\[17660\]: Invalid user wwwadmin from 123.142.29.76
Sep 11 07:02:55 TORMINT sshd\[17660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.142.29.76
Sep 11 07:02:57 TORMINT sshd\[17660\]: Failed password for invalid user wwwadmin from 123.142.29.76 port 49964 ssh2
...
2019-09-11 19:17:33

Recently Reported IPs

129.211.171.161 129.213.214.220 13.107.43.14 129.213.154.50
129.56.23.24 129.226.101.8 129.45.24.89 13.111.21.67
13.112.242.218 129.45.27.252 13.111.30.193 13.112.203.81
13.115.198.99 129.45.89.202 13.115.240.140 13.113.32.136
13.127.93.55 13.115.229.7 13.124.29.164 13.124.44.20