Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.232.249.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22389
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.232.249.21.			IN	A

;; AUTHORITY SECTION:
.			469	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022202 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 23 13:24:22 CST 2022
;; MSG SIZE  rcvd: 107
Host info
21.249.232.129.in-addr.arpa domain name pointer dedi1021.jnb1.host-h.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.249.232.129.in-addr.arpa	name = dedi1021.jnb1.host-h.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
91.237.121.11 attackspam
2019-07-25T03:58:53.961371 X postfix/smtpd[41682]: NOQUEUE: reject: RCPT from unknown[91.237.121.11]: 554 5.7.1 Service unavailable; Client host [91.237.121.11] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?91.237.121.11; from= to= proto=ESMTP helo=
2019-07-25 19:12:06
179.187.113.70 attack
Honeypot attack, port: 23, PTR: 179.187.113.70.dynamic.adsl.gvt.net.br.
2019-07-25 18:38:52
139.198.190.165 attackspambots
Jul 25 09:57:20 webhost01 sshd[26579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.190.165
Jul 25 09:57:23 webhost01 sshd[26579]: Failed password for invalid user julius from 139.198.190.165 port 48648 ssh2
...
2019-07-25 18:22:51
175.211.112.254 attack
Invalid user farah from 175.211.112.254 port 49894
2019-07-25 18:57:34
188.226.250.187 attackspam
Invalid user oracle from 188.226.250.187 port 49878
2019-07-25 18:18:16
51.91.249.91 attackbots
Jul 24 21:55:47 fv15 sshd[20154]: Failed password for invalid user ssingh from 51.91.249.91 port 45046 ssh2
Jul 24 21:55:47 fv15 sshd[20154]: Received disconnect from 51.91.249.91: 11: Bye Bye [preauth]
Jul 24 22:05:34 fv15 sshd[12990]: Failed password for invalid user xxxxxx from 51.91.249.91 port 49560 ssh2
Jul 24 22:05:34 fv15 sshd[12990]: Received disconnect from 51.91.249.91: 11: Bye Bye [preauth]
Jul 24 22:09:45 fv15 sshd[30386]: Failed password for invalid user postgresql from 51.91.249.91 port 45730 ssh2
Jul 24 22:09:45 fv15 sshd[30386]: Received disconnect from 51.91.249.91: 11: Bye Bye [preauth]
Jul 24 22:13:51 fv15 sshd[1039]: Failed password for invalid user oracle from 51.91.249.91 port 41894 ssh2
Jul 24 22:13:51 fv15 sshd[1039]: Received disconnect from 51.91.249.91: 11: Bye Bye [preauth]
Jul 24 22:17:57 fv15 sshd[18192]: Failed password for invalid user ubuntu from 51.91.249.91 port 38060 ssh2
Jul 24 22:17:57 fv15 sshd[18192]: Received disconnect from 51.........
-------------------------------
2019-07-25 18:28:29
86.14.118.227 attackspambots
Automatic report - Port Scan Attack
2019-07-25 19:15:56
62.210.169.3 attackbots
\[Thu Jul 25 03:58:59.298070 2019\] \[authz_core:error\] \[pid 9959:tid 140145294493440\] \[client 62.210.169.3:24978\] AH01630: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/reagan-foxx-my-stepmom-gets-me-hard
\[Thu Jul 25 03:59:06.175552 2019\] \[authz_core:error\] \[pid 4156:tid 140145302886144\] \[client 62.210.169.3:26128\] AH01630: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/reagan-foxx-my-stepmom-gets-me-hard
\[Thu Jul 25 03:59:10.054267 2019\] \[authz_core:error\] \[pid 2064:tid 140145378420480\] \[client 62.210.169.3:26354\] AH01630: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/reagan-foxx-my-stepmom-gets-me-hard
\[Thu Jul 25 03:59:17.536164 2019\] \[authz_core:error\] \[pid 9930:tid 140145395205888\] \[client 62.210.169.3:26986\] AH01630: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/reagan-foxx-my-stepmom-gets-me-hard
...
2019-07-25 18:54:57
68.183.50.0 attackbotsspam
2019-07-25T10:46:20.882660abusebot-2.cloudsearch.cf sshd\[8666\]: Invalid user nikolas from 68.183.50.0 port 50336
2019-07-25 19:14:10
188.83.163.6 attackbotsspam
Jul 25 06:36:54 plusreed sshd[18217]: Invalid user ts3 from 188.83.163.6
...
2019-07-25 18:52:35
94.191.70.31 attackspambots
Jul 25 03:19:50 microserver sshd[5962]: Invalid user acs from 94.191.70.31 port 47764
Jul 25 03:19:50 microserver sshd[5962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.70.31
Jul 25 03:19:51 microserver sshd[5962]: Failed password for invalid user acs from 94.191.70.31 port 47764 ssh2
Jul 25 03:25:09 microserver sshd[7488]: Invalid user hrh from 94.191.70.31 port 40514
Jul 25 03:25:09 microserver sshd[7488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.70.31
Jul 25 03:35:29 microserver sshd[9256]: Invalid user debian from 94.191.70.31 port 54198
Jul 25 03:35:29 microserver sshd[9256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.70.31
Jul 25 03:35:31 microserver sshd[9256]: Failed password for invalid user debian from 94.191.70.31 port 54198 ssh2
Jul 25 03:40:45 microserver sshd[10071]: Invalid user vss from 94.191.70.31 port 46912
Jul 25 03:40:45 microserver
2019-07-25 19:11:39
104.246.113.80 attackbotsspam
Jul 25 10:03:29 ip-172-31-1-72 sshd\[5269\]: Invalid user duplicity from 104.246.113.80
Jul 25 10:03:29 ip-172-31-1-72 sshd\[5269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.246.113.80
Jul 25 10:03:31 ip-172-31-1-72 sshd\[5269\]: Failed password for invalid user duplicity from 104.246.113.80 port 51848 ssh2
Jul 25 10:08:04 ip-172-31-1-72 sshd\[5350\]: Invalid user scanner from 104.246.113.80
Jul 25 10:08:04 ip-172-31-1-72 sshd\[5350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.246.113.80
2019-07-25 18:12:32
51.68.122.190 attackbotsspam
25.07.2019 10:10:00 SSH access blocked by firewall
2019-07-25 18:14:16
157.230.254.143 attack
Jul 25 05:20:35 mout sshd[29662]: Invalid user geoff from 157.230.254.143 port 45556
2019-07-25 19:03:46
108.172.169.45 attack
Jul 25 12:18:08 ArkNodeAT sshd\[14752\]: Invalid user gateway from 108.172.169.45
Jul 25 12:18:08 ArkNodeAT sshd\[14752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.172.169.45
Jul 25 12:18:10 ArkNodeAT sshd\[14752\]: Failed password for invalid user gateway from 108.172.169.45 port 51816 ssh2
2019-07-25 19:10:35

Recently Reported IPs

129.232.213.100 129.232.249.101 129.32.84.230 129.82.111.75
129.97.83.105 13.107.213.42 129.97.83.96 129.67.193.45
13.107.213.64 13.107.219.69 129.42.42.243 129.232.251.196
13.107.227.69 129.42.21.22 13.107.246.42 13.112.105.196
13.112.149.35 13.112.153.121 13.113.227.24 13.113.35.30