Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: Verein zur Foerderung eines Deutschen Forschungsnetzes e.V.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.26.145.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49099
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;129.26.145.99.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019053000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu May 30 22:58:30 CST 2019
;; MSG SIZE  rcvd: 117

Host info
Host 99.145.26.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 99.145.26.129.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
222.186.31.136 attack
2019-09-20T06:12:41.707286enmeeting.mahidol.ac.th sshd\[5786\]: User root from 222.186.31.136 not allowed because not listed in AllowUsers
2019-09-20T06:12:42.078594enmeeting.mahidol.ac.th sshd\[5786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.136  user=root
2019-09-20T06:12:44.144593enmeeting.mahidol.ac.th sshd\[5786\]: Failed password for invalid user root from 222.186.31.136 port 35058 ssh2
...
2019-09-20 07:19:50
220.117.175.165 attackspambots
Sep 20 00:47:44 microserver sshd[31010]: Invalid user jose from 220.117.175.165 port 50276
Sep 20 00:47:44 microserver sshd[31010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.117.175.165
Sep 20 00:47:45 microserver sshd[31010]: Failed password for invalid user jose from 220.117.175.165 port 50276 ssh2
Sep 20 00:53:04 microserver sshd[31702]: Invalid user weblogic from 220.117.175.165 port 35738
Sep 20 00:53:04 microserver sshd[31702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.117.175.165
Sep 20 01:04:08 microserver sshd[33168]: Invalid user transfer from 220.117.175.165 port 34902
Sep 20 01:04:08 microserver sshd[33168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.117.175.165
Sep 20 01:04:10 microserver sshd[33168]: Failed password for invalid user transfer from 220.117.175.165 port 34902 ssh2
Sep 20 01:09:30 microserver sshd[33864]: Invalid user rf from 220.117.17
2019-09-20 07:28:11
133.242.228.107 attackbots
Automatic report - SSH Brute-Force Attack
2019-09-20 07:02:21
176.113.128.114 attackbotsspam
Unauthorized connection attempt from IP address 176.113.128.114 on Port 445(SMB)
2019-09-20 07:33:50
162.243.98.66 attack
Automatic report - Banned IP Access
2019-09-20 07:06:09
205.185.122.3 attack
Sep 20 00:58:40 plex sshd[15122]: Invalid user souda from 205.185.122.3 port 46200
2019-09-20 06:59:08
172.105.4.63 attackbots
Port scan: Attack repeated for 24 hours
2019-09-20 06:57:57
67.207.94.17 attackspam
F2B jail: sshd. Time: 2019-09-19 22:37:39, Reported by: VKReport
2019-09-20 07:12:50
114.67.68.30 attackbots
Sep 20 00:57:41 markkoudstaal sshd[28998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.68.30
Sep 20 00:57:43 markkoudstaal sshd[28998]: Failed password for invalid user teamspeak from 114.67.68.30 port 51496 ssh2
Sep 20 01:00:59 markkoudstaal sshd[29272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.68.30
2019-09-20 07:02:49
222.212.136.209 attackbots
Automatic report - SSH Brute-Force Attack
2019-09-20 07:41:47
190.14.240.74 attack
Sep 19 23:55:58 [host] sshd[8861]: Invalid user cai from 190.14.240.74
Sep 19 23:55:58 [host] sshd[8861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.14.240.74
Sep 19 23:56:00 [host] sshd[8861]: Failed password for invalid user cai from 190.14.240.74 port 56976 ssh2
2019-09-20 07:40:01
103.1.237.139 attack
WordPress brute force
2019-09-20 07:11:18
182.254.214.133 attackspam
Unauthorized connection attempt from IP address 182.254.214.133 on Port 445(SMB)
2019-09-20 07:24:30
107.167.180.11 attack
2019-09-19T23:16:01.739857abusebot-6.cloudsearch.cf sshd\[6160\]: Invalid user citrix from 107.167.180.11 port 33184
2019-09-20 07:24:43
200.84.171.85 attackspambots
Automatic report - Port Scan Attack
2019-09-20 07:21:32

Recently Reported IPs

37.230.225.49 206.155.153.53 55.174.138.165 109.234.20.147
207.101.145.113 209.59.210.46 23.1.187.140 97.198.66.145
27.73.152.15 31.30.149.133 40.210.37.139 173.238.77.178
4.237.234.73 195.68.186.115 190.121.29.71 218.30.250.65
128.39.155.194 49.66.24.25 183.102.164.23 12.78.181.96