Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.245.180.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39021
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.245.180.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020700 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 19:07:57 CST 2025
;; MSG SIZE  rcvd: 107
Host info
14.180.245.129.in-addr.arpa domain name pointer nothing.attdns.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.180.245.129.in-addr.arpa	name = nothing.attdns.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
223.247.129.84 attackspam
Feb 22 14:10:12  sshd\[31929\]: Invalid user act-ftp from 223.247.129.84Feb 22 14:10:14  sshd\[31929\]: Failed password for invalid user act-ftp from 223.247.129.84 port 44838 ssh2
...
2020-02-23 00:10:22
66.249.155.244 attackspambots
Feb 22 03:51:24 sachi sshd\[15143\]: Invalid user sandbox from 66.249.155.244
Feb 22 03:51:24 sachi sshd\[15143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.249.155.244
Feb 22 03:51:26 sachi sshd\[15143\]: Failed password for invalid user sandbox from 66.249.155.244 port 58062 ssh2
Feb 22 03:55:01 sachi sshd\[15433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.249.155.244  user=root
Feb 22 03:55:03 sachi sshd\[15433\]: Failed password for root from 66.249.155.244 port 57942 ssh2
2020-02-23 00:16:51
180.97.74.137 attackbots
Port probing on unauthorized port 1433
2020-02-23 00:05:30
121.164.126.59 attackspambots
firewall-block, port(s): 23/tcp
2020-02-23 00:12:23
45.252.248.18 attack
REQUESTED PAGE: /wp-login.php
2020-02-23 00:35:18
104.244.79.250 attackspam
suspicious action Sat, 22 Feb 2020 10:09:42 -0300
2020-02-23 00:38:20
51.77.201.36 attackspam
$f2bV_matches
2020-02-23 00:44:51
103.55.89.189 attackspam
Port probing on unauthorized port 23
2020-02-23 00:36:36
79.143.44.122 attack
SSH Bruteforce attack
2020-02-23 00:23:49
134.90.149.147 attackbots
(From irungu.millicent@yahoo.com) Invest $ 5,000 in Bitcoin mining оnce аnd get $ 70,000 passive incоmе pеr month: https://darknesstr.com/getmoney159489
2020-02-23 00:29:23
84.242.118.84 attackspambots
firewall-block, port(s): 1433/tcp
2020-02-23 00:18:55
187.174.219.142 attackbotsspam
Feb 22 17:20:48 server sshd[3796211]: Failed password for invalid user guest from 187.174.219.142 port 43628 ssh2
Feb 22 17:30:28 server sshd[3801931]: Failed password for invalid user research from 187.174.219.142 port 43586 ssh2
Feb 22 17:33:46 server sshd[3804091]: Failed password for invalid user gongmq from 187.174.219.142 port 43578 ssh2
2020-02-23 00:43:05
200.125.166.227 attack
" "
2020-02-23 00:09:10
92.63.196.3 attackbotsspam
Excessive Port-Scanning
2020-02-23 00:13:45
3.133.88.83 attackspam
xmlrpc attack
2020-02-23 00:11:06

Recently Reported IPs

186.153.175.174 174.205.186.115 60.55.176.75 180.237.36.15
201.119.168.87 114.36.215.78 242.89.216.106 86.112.191.7
207.67.65.207 7.49.58.113 236.25.7.169 73.235.187.74
121.156.58.188 83.237.232.113 83.23.233.139 71.141.130.232
201.214.11.251 50.22.219.233 64.81.221.139 96.14.162.226