Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.220.211.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63464
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.220.211.114.		IN	A

;; AUTHORITY SECTION:
.			60	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022101901 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 20 02:39:30 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 114.211.220.129.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 129.220.211.114.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
187.120.15.222 attack
Aug 25 17:34:59 lcdev sshd\[4835\]: Invalid user amssys from 187.120.15.222
Aug 25 17:34:59 lcdev sshd\[4835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.120.15.222
Aug 25 17:35:01 lcdev sshd\[4835\]: Failed password for invalid user amssys from 187.120.15.222 port 60864 ssh2
Aug 25 17:40:28 lcdev sshd\[5447\]: Invalid user rolo123 from 187.120.15.222
Aug 25 17:40:28 lcdev sshd\[5447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.120.15.222
2019-08-26 16:49:11
61.219.143.205 attackbots
[Aegis] @ 2019-08-26 06:50:57  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-08-26 16:48:47
46.161.27.122 attack
Aug 26 08:41:16 mail kernel: \[4062911.410374\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=46.161.27.122 DST=91.205.173.180 LEN=60 TOS=0x08 PREC=0x20 TTL=54 ID=6792 DF PROTO=TCP SPT=47286 DPT=1723 WINDOW=29200 RES=0x00 SYN URGP=0 
Aug 26 08:41:18 mail kernel: \[4062913.987302\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=46.161.27.122 DST=91.205.173.180 LEN=60 TOS=0x08 PREC=0x20 TTL=54 ID=6796 DF PROTO=TCP SPT=47286 DPT=1723 WINDOW=29200 RES=0x00 SYN URGP=0 
Aug 26 08:41:21 mail kernel: \[4062916.503676\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=46.161.27.122 DST=91.205.173.180 LEN=60 TOS=0x08 PREC=0x20 TTL=54 ID=6798 DF PROTO=TCP SPT=47286 DPT=1723 WINDOW=29200 RES=0x00 SYN URGP=0
2019-08-26 16:45:30
125.27.12.20 attack
Aug 26 10:19:43 lcl-usvr-02 sshd[25903]: Invalid user sun from 125.27.12.20 port 37994
Aug 26 10:19:43 lcl-usvr-02 sshd[25903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.27.12.20
Aug 26 10:19:43 lcl-usvr-02 sshd[25903]: Invalid user sun from 125.27.12.20 port 37994
Aug 26 10:19:45 lcl-usvr-02 sshd[25903]: Failed password for invalid user sun from 125.27.12.20 port 37994 ssh2
Aug 26 10:24:25 lcl-usvr-02 sshd[27013]: Invalid user sales from 125.27.12.20 port 55104
...
2019-08-26 16:50:41
133.130.117.173 attackbots
Aug 26 09:51:40 tux-35-217 sshd\[27304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.117.173  user=root
Aug 26 09:51:42 tux-35-217 sshd\[27304\]: Failed password for root from 133.130.117.173 port 59830 ssh2
Aug 26 09:56:25 tux-35-217 sshd\[27328\]: Invalid user admin from 133.130.117.173 port 49840
Aug 26 09:56:25 tux-35-217 sshd\[27328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.117.173
...
2019-08-26 16:13:47
23.253.253.225 attackspam
Aug 26 09:53:57 debian sshd\[32716\]: Invalid user kramer from 23.253.253.225 port 52032
Aug 26 09:53:57 debian sshd\[32716\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.253.253.225
...
2019-08-26 16:56:59
119.50.138.255 attack
" "
2019-08-26 16:27:15
107.21.1.8 attackbots
Automatic report - Banned IP Access
2019-08-26 16:18:41
62.210.89.20 attack
" "
2019-08-26 16:32:05
85.106.102.105 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-25 17:40:32,073 INFO [shellcode_manager] (85.106.102.105) no match, writing hexdump (14646bb7ea26484dccf284845bd57dee :2596888) - MS17010 (EternalBlue)
2019-08-26 16:49:47
34.80.215.54 attack
2019-08-26T15:08:39.437433enmeeting.mahidol.ac.th sshd\[585\]: Invalid user tester from 34.80.215.54 port 42002
2019-08-26T15:08:39.451618enmeeting.mahidol.ac.th sshd\[585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.215.80.34.bc.googleusercontent.com
2019-08-26T15:08:41.901934enmeeting.mahidol.ac.th sshd\[585\]: Failed password for invalid user tester from 34.80.215.54 port 42002 ssh2
...
2019-08-26 16:34:29
202.51.110.214 attack
Aug 26 07:28:46 lnxweb61 sshd[6924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.110.214
2019-08-26 16:39:53
144.217.83.201 attack
$f2bV_matches
2019-08-26 16:31:42
113.194.90.28 attack
Aug 25 21:53:44 friendsofhawaii sshd\[1335\]: Invalid user ck from 113.194.90.28
Aug 25 21:53:44 friendsofhawaii sshd\[1335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.194.90.28
Aug 25 21:53:46 friendsofhawaii sshd\[1335\]: Failed password for invalid user ck from 113.194.90.28 port 56842 ssh2
Aug 25 21:57:01 friendsofhawaii sshd\[1671\]: Invalid user pvm from 113.194.90.28
Aug 25 21:57:01 friendsofhawaii sshd\[1671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.194.90.28
2019-08-26 16:08:46
104.42.28.217 attackbotsspam
Aug 26 05:12:44 smtp-out sshd[13960]: Invalid user melissa from 104.42.28.217 port 10136
Aug 26 05:12:44 smtp-out sshd[13960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.42.28.217
Aug 26 05:12:46 smtp-out sshd[13960]: Failed password for invalid user melissa from 104.42.28.217 port 10136 ssh2
Aug 26 05:12:46 smtp-out sshd[13960]: Received disconnect from 104.42.28.217 port 10136:11: Bye Bye [preauth]
Aug 26 05:12:46 smtp-out sshd[13960]: Disconnected from 104.42.28.217 port 10136 [preauth]
Aug 26 05:18:16 smtp-out sshd[14100]: Invalid user reserverechner from 104.42.28.217 port 9232
Aug 26 05:18:16 smtp-out sshd[14100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.42.28.217


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.42.28.217
2019-08-26 16:44:55

Recently Reported IPs

94.171.162.212 9.185.24.40 244.178.168.144 47.236.133.170
95.189.153.53 217.107.25.245 54.247.181.86 186.218.186.102
94.90.245.136 123.243.123.21 26.44.42.128 197.175.88.95
167.173.32.76 224.196.96.185 40.65.200.218 148.235.59.107
27.26.88.220 115.108.200.251 231.241.53.19 118.95.209.135