Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.44.148.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32463
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.44.148.136.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025032901 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 30 04:45:58 CST 2025
;; MSG SIZE  rcvd: 107
Host info
136.148.44.129.in-addr.arpa domain name pointer pool-129-44-148-136.buff.east.verizon.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.148.44.129.in-addr.arpa	name = pool-129-44-148-136.buff.east.verizon.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
95.110.235.17 attack
Sep  2 14:15:21 eddieflores sshd\[31763\]: Invalid user sg from 95.110.235.17
Sep  2 14:15:21 eddieflores sshd\[31763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.110.235.17
Sep  2 14:15:24 eddieflores sshd\[31763\]: Failed password for invalid user sg from 95.110.235.17 port 40894 ssh2
Sep  2 14:19:07 eddieflores sshd\[32094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.110.235.17  user=root
Sep  2 14:19:10 eddieflores sshd\[32094\]: Failed password for root from 95.110.235.17 port 33976 ssh2
2019-09-03 12:27:00
118.97.113.234 attackspambots
f2b trigger Multiple SASL failures
2019-09-03 12:11:13
178.128.87.245 attackbotsspam
Sep  3 06:56:11 yabzik sshd[21137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.87.245
Sep  3 06:56:12 yabzik sshd[21137]: Failed password for invalid user netdiag from 178.128.87.245 port 39244 ssh2
Sep  3 07:03:05 yabzik sshd[23637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.87.245
2019-09-03 12:10:29
209.97.166.196 attack
Sep  3 03:49:11 www_kotimaassa_fi sshd[12661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.166.196
Sep  3 03:49:13 www_kotimaassa_fi sshd[12661]: Failed password for invalid user ubuntu from 209.97.166.196 port 39160 ssh2
...
2019-09-03 11:54:31
84.193.142.76 attackbotsspam
2019-08-09T08:43:28.888925wiz-ks3 sshd[26786]: Invalid user chughett from 84.193.142.76 port 55012
2019-08-09T08:43:28.890979wiz-ks3 sshd[26786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=d54c18e4c.access.telenet.be
2019-08-09T08:43:28.888925wiz-ks3 sshd[26786]: Invalid user chughett from 84.193.142.76 port 55012
2019-08-09T08:43:30.665284wiz-ks3 sshd[26786]: Failed password for invalid user chughett from 84.193.142.76 port 55012 ssh2
2019-08-09T09:12:46.434878wiz-ks3 sshd[27919]: Invalid user minecraft from 84.193.142.76 port 48104
2019-08-09T09:12:46.436936wiz-ks3 sshd[27919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=d54c18e4c.access.telenet.be
2019-08-09T09:12:46.434878wiz-ks3 sshd[27919]: Invalid user minecraft from 84.193.142.76 port 48104
2019-08-09T09:12:48.555277wiz-ks3 sshd[27919]: Failed password for invalid user minecraft from 84.193.142.76 port 48104 ssh2
2019-08-09T09:41:56.520260wiz-ks3 sshd[28004]: Inva
2019-09-03 11:58:45
118.69.32.195 attackspam
Unauthorised access (Sep  3) SRC=118.69.32.195 LEN=52 TTL=110 ID=19867 DF TCP DPT=445 WINDOW=8192 SYN
2019-09-03 12:32:50
91.188.176.150 attack
Unauthorized connection attempt from IP address 91.188.176.150 on Port 445(SMB)
2019-09-03 12:17:53
194.38.2.218 attackbotsspam
[portscan] Port scan
2019-09-03 12:07:25
191.7.209.166 attackspambots
Unauthorized connection attempt from IP address 191.7.209.166 on Port 25(SMTP)
2019-09-03 11:57:30
50.199.46.20 attackbots
Automatic report - Banned IP Access
2019-09-03 12:20:27
80.73.87.222 attackspam
Unauthorized connection attempt from IP address 80.73.87.222 on Port 445(SMB)
2019-09-03 11:59:37
187.188.73.122 attack
Unauthorized connection attempt from IP address 187.188.73.122 on Port 445(SMB)
2019-09-03 12:32:29
201.211.113.156 attackspam
Unauthorized connection attempt from IP address 201.211.113.156 on Port 445(SMB)
2019-09-03 12:05:14
85.209.42.23 attack
Unauthorized connection attempt from IP address 85.209.42.23 on Port 445(SMB)
2019-09-03 12:27:31
45.33.109.12 attackspambots
*Port Scan* detected from 45.33.109.12 (US/United States/jscan005.ampereinnotech.com). 11 hits in the last 231 seconds
2019-09-03 12:12:33

Recently Reported IPs

21.163.161.100 75.159.42.139 203.136.103.253 170.15.157.228
145.205.137.104 148.46.85.41 205.20.172.221 89.151.166.9
90.145.191.92 229.253.174.216 230.107.141.89 189.157.136.219
101.25.178.240 118.208.69.127 75.86.72.2 196.150.134.112
221.165.99.139 38.26.54.149 159.61.151.162 119.79.99.225