Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Redondo Beach

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.4.82.250
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64074
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.4.82.250.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 11:50:25 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 250.82.4.129.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 129.4.82.250.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.183 attackspambots
Nov  5 12:31:00 root sshd[30339]: Failed password for root from 222.186.175.183 port 62952 ssh2
Nov  5 12:31:03 root sshd[30339]: Failed password for root from 222.186.175.183 port 62952 ssh2
Nov  5 12:31:09 root sshd[30339]: Failed password for root from 222.186.175.183 port 62952 ssh2
Nov  5 12:31:13 root sshd[30339]: Failed password for root from 222.186.175.183 port 62952 ssh2
...
2019-11-05 19:36:18
49.204.229.134 attackspambots
Honeypot attack, port: 445, PTR: broadband.actcorp.in.
2019-11-05 19:26:18
46.38.144.57 attack
Nov  5 12:17:50 webserver postfix/smtpd\[25371\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  5 12:18:59 webserver postfix/smtpd\[25371\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  5 12:20:06 webserver postfix/smtpd\[26752\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  5 12:21:17 webserver postfix/smtpd\[25371\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  5 12:22:26 webserver postfix/smtpd\[25177\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-05 19:27:59
81.171.85.138 attackspambots
\[2019-11-05 06:37:32\] NOTICE\[2601\] chan_sip.c: Registration from '\' failed for '81.171.85.138:49398' - Wrong password
\[2019-11-05 06:37:32\] SECURITY\[2634\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-05T06:37:32.621-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="601",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.171.85.138/49398",Challenge="60e4c714",ReceivedChallenge="60e4c714",ReceivedHash="e92c2afc555dc183b7c9bafd080dd8aa"
\[2019-11-05 06:38:42\] NOTICE\[2601\] chan_sip.c: Registration from '\' failed for '81.171.85.138:60006' - Wrong password
\[2019-11-05 06:38:42\] SECURITY\[2634\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-05T06:38:42.284-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="1160",SessionID="0x7fdf2c3f5928",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.171.85.1
2019-11-05 19:42:59
188.166.159.148 attackspambots
Nov  5 09:24:31 server sshd\[26407\]: User root from 188.166.159.148 not allowed because listed in DenyUsers
Nov  5 09:24:31 server sshd\[26407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.159.148  user=root
Nov  5 09:24:33 server sshd\[26407\]: Failed password for invalid user root from 188.166.159.148 port 49325 ssh2
Nov  5 09:28:10 server sshd\[32748\]: Invalid user reception from 188.166.159.148 port 40050
Nov  5 09:28:10 server sshd\[32748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.159.148
2019-11-05 19:51:46
110.35.210.30 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-05 19:33:18
124.16.139.243 attack
Automatic report - Banned IP Access
2019-11-05 19:36:42
77.42.124.246 attackbotsspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-05 19:41:54
176.114.14.41 attack
Nov  4 13:28:04 www sshd[14181]: Address 176.114.14.41 maps to questionbank2017.freedomain.thehost.com.ua, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Nov  4 13:28:04 www sshd[14181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.114.14.41  user=r.r
Nov  4 13:28:06 www sshd[14181]: Failed password for r.r from 176.114.14.41 port 41456 ssh2
Nov  4 13:28:06 www sshd[14181]: Received disconnect from 176.114.14.41: 11: Bye Bye [preauth]
Nov  4 13:48:11 www sshd[14503]: Address 176.114.14.41 maps to questionbank2017.freedomain.thehost.com.ua, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Nov  4 13:48:11 www sshd[14503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.114.14.41  user=r.r
Nov  4 13:48:13 www sshd[14503]: Failed password for r.r from 176.114.14.41 port 44862 ssh2
Nov  4 13:48:13 www sshd[14503]: Received disconnect from 1........
-------------------------------
2019-11-05 19:43:52
187.163.87.127 attack
Automatic report - Port Scan Attack
2019-11-05 19:44:56
216.218.206.99 attack
scan z
2019-11-05 19:53:26
92.119.160.107 attackbots
Nov  5 12:28:10 mc1 kernel: \[4239593.141215\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=46704 PROTO=TCP SPT=43393 DPT=53306 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  5 12:28:35 mc1 kernel: \[4239617.827687\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=42955 PROTO=TCP SPT=43393 DPT=52879 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  5 12:30:06 mc1 kernel: \[4239709.419919\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=5203 PROTO=TCP SPT=43393 DPT=52751 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-05 19:46:56
113.14.132.165 attackspam
port scan and connect, tcp 23 (telnet)
2019-11-05 19:46:03
183.103.66.105 attackbotsspam
Fail2Ban - FTP Abuse Attempt
2019-11-05 20:00:36
117.0.39.22 attackbots
Unauthorised access (Nov  5) SRC=117.0.39.22 LEN=52 TTL=106 ID=10762 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-05 19:41:33

Recently Reported IPs

235.73.154.182 135.125.205.109 207.228.245.118 91.220.255.227
5.196.46.233 238.224.58.214 223.207.95.22 115.50.247.160
149.3.170.217 95.39.52.91 250.166.132.151 190.205.23.39
208.185.4.154 48.213.32.46 215.155.72.223 19.139.79.9
30.72.8.124 61.231.94.225 91.21.247.110 170.141.225.239