Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Redondo Beach

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.4.113.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63375
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.4.113.57.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011001 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 11 06:31:01 CST 2025
;; MSG SIZE  rcvd: 105
Host info
b'Host 57.113.4.129.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
server can't find 129.4.113.57.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
192.241.214.46 attack
389/tcp 5903/tcp 3306/tcp...
[2020-09-16/10-06]21pkt,19pt.(tcp),1pt.(udp)
2020-10-06 19:05:49
103.15.50.174 attack
Oct  6 04:38:02 doubuntu sshd[17043]: Invalid user centos from 103.15.50.174 port 48108
Oct  6 04:38:02 doubuntu sshd[17043]: Disconnected from invalid user centos 103.15.50.174 port 48108 [preauth]
...
2020-10-06 18:48:43
194.87.138.97 attackbotsspam
 TCP (SYN) 194.87.138.97:37304 -> port 23, len 44
2020-10-06 18:51:41
31.23.147.255 attackbotsspam
445/tcp
[2020-10-05]1pkt
2020-10-06 18:51:21
122.255.5.42 attackbotsspam
SSH login attempts.
2020-10-06 19:07:39
212.83.186.26 attack
Invalid user nagios from 212.83.186.26 port 59318
2020-10-06 18:58:33
189.153.154.6 attackspam
23/tcp
[2020-10-05]1pkt
2020-10-06 18:54:14
172.105.110.26 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: li2151-26.members.linode.com.
2020-10-06 18:44:44
103.133.109.40 attackbotsspam
Oct  6 08:53:26 ns308116 postfix/smtpd[31001]: warning: unknown[103.133.109.40]: SASL LOGIN authentication failed: authentication failure
Oct  6 08:53:26 ns308116 postfix/smtpd[31001]: warning: unknown[103.133.109.40]: SASL LOGIN authentication failed: authentication failure
Oct  6 08:53:27 ns308116 postfix/smtpd[31001]: warning: unknown[103.133.109.40]: SASL LOGIN authentication failed: authentication failure
Oct  6 08:53:27 ns308116 postfix/smtpd[31001]: warning: unknown[103.133.109.40]: SASL LOGIN authentication failed: authentication failure
Oct  6 08:53:28 ns308116 postfix/smtpd[31001]: warning: unknown[103.133.109.40]: SASL LOGIN authentication failed: authentication failure
Oct  6 08:53:28 ns308116 postfix/smtpd[31001]: warning: unknown[103.133.109.40]: SASL LOGIN authentication failed: authentication failure
...
2020-10-06 18:37:17
103.92.225.36 attack
22/tcp 8291/tcp 8291/tcp
[2020-10-05]3pkt
2020-10-06 18:57:05
58.87.127.192 attack
20 attempts against mh-ssh on mist
2020-10-06 19:00:25
54.38.18.211 attackbotsspam
Oct  6 14:26:38 gw1 sshd[32591]: Failed password for root from 54.38.18.211 port 54232 ssh2
...
2020-10-06 19:03:52
103.133.105.65 attackspam
Oct  6 12:44:32 mx postfix/postscreen\[4557\]: PREGREET 11 after 0.38 from \[103.133.105.65\]:58072: EHLO User

...
2020-10-06 19:00:02
198.71.238.3 attackbotsspam
xmlrpc attack
2020-10-06 19:07:24
117.50.49.57 attackspam
Invalid user test2 from 117.50.49.57 port 51428
2020-10-06 18:32:26

Recently Reported IPs

125.43.200.70 133.141.156.28 145.233.180.222 21.17.213.159
46.164.174.67 72.117.240.213 136.52.43.47 114.114.29.219
201.143.228.51 131.221.25.43 219.116.234.117 87.149.113.101
20.21.203.151 178.204.74.42 163.218.169.103 46.226.50.82
64.244.240.103 148.149.222.245 160.100.245.176 104.18.37.248