Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.44.98.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25804
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.44.98.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024112101 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 22 02:51:09 CST 2024
;; MSG SIZE  rcvd: 105
Host info
42.98.44.129.in-addr.arpa domain name pointer pool-129-44-98-42.pghk.east.verizon.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.98.44.129.in-addr.arpa	name = pool-129-44-98-42.pghk.east.verizon.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
134.19.218.134 attack
fail2ban
2019-09-13 05:02:56
114.41.192.70 attackspam
23/tcp 23/tcp 23/tcp
[2019-09-10/12]3pkt
2019-09-13 05:07:16
173.245.239.219 attack
2019/09/12 14:47:54 \[error\] 3998\#0: \*2359 An error occurred in mail zmauth: user not found:kownacki62@*fathog.com while SSL handshaking to lookup handler, client: 173.245.239.219:38882, server: 45.79.145.195:993, login: "kownacki62@*fathog.com"
2019-09-13 05:04:20
104.248.58.71 attack
$f2bV_matches
2019-09-13 04:34:04
54.38.82.14 attackspam
Sep 12 15:41:15 vps200512 sshd\[16113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14  user=root
Sep 12 15:41:17 vps200512 sshd\[16113\]: Failed password for root from 54.38.82.14 port 55869 ssh2
Sep 12 15:41:18 vps200512 sshd\[16115\]: Invalid user admin from 54.38.82.14
Sep 12 15:41:18 vps200512 sshd\[16115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14
Sep 12 15:41:19 vps200512 sshd\[16115\]: Failed password for invalid user admin from 54.38.82.14 port 39591 ssh2
2019-09-13 04:46:12
198.211.122.197 attackbotsspam
2019-09-12T19:02:12.962302abusebot-8.cloudsearch.cf sshd\[8934\]: Invalid user 123456 from 198.211.122.197 port 44470
2019-09-13 05:13:37
95.213.177.122 attackbotsspam
Port scan on 6 port(s): 1080 3128 8080 8888 9999 65531
2019-09-13 04:22:59
209.126.230.74 attackbots
firewall-block, port(s): 794/tcp, 1154/tcp, 14281/tcp, 16256/tcp, 39446/tcp, 54290/tcp, 61500/tcp
2019-09-13 04:48:57
58.145.168.162 attackspam
Sep 12 16:30:21 xtremcommunity sshd\[23633\]: Invalid user password1 from 58.145.168.162 port 46586
Sep 12 16:30:21 xtremcommunity sshd\[23633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.145.168.162
Sep 12 16:30:23 xtremcommunity sshd\[23633\]: Failed password for invalid user password1 from 58.145.168.162 port 46586 ssh2
Sep 12 16:36:41 xtremcommunity sshd\[23730\]: Invalid user 123456 from 58.145.168.162 port 44768
Sep 12 16:36:41 xtremcommunity sshd\[23730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.145.168.162
...
2019-09-13 04:47:21
114.43.211.82 attackspambots
23/tcp 23/tcp
[2019-09-10/11]2pkt
2019-09-13 04:26:42
81.177.98.52 attackbotsspam
Sep 12 13:45:22 vtv3 sshd\[22248\]: Invalid user sinusbot1 from 81.177.98.52 port 44650
Sep 12 13:45:22 vtv3 sshd\[22248\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.177.98.52
Sep 12 13:45:24 vtv3 sshd\[22248\]: Failed password for invalid user sinusbot1 from 81.177.98.52 port 44650 ssh2
Sep 12 13:52:13 vtv3 sshd\[25575\]: Invalid user appuser from 81.177.98.52 port 59358
Sep 12 13:52:13 vtv3 sshd\[25575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.177.98.52
Sep 12 14:09:15 vtv3 sshd\[2020\]: Invalid user admin from 81.177.98.52 port 41998
Sep 12 14:09:15 vtv3 sshd\[2020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.177.98.52
Sep 12 14:09:17 vtv3 sshd\[2020\]: Failed password for invalid user admin from 81.177.98.52 port 41998 ssh2
Sep 12 14:14:52 vtv3 sshd\[4774\]: Invalid user oracle from 81.177.98.52 port 45618
Sep 12 14:14:52 vtv3 sshd\[4774\]: pam_unix
2019-09-13 04:51:01
121.166.187.237 attack
Sep 12 17:05:54 lenivpn01 kernel: \[533553.956427\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=121.166.187.237 DST=195.201.121.15 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=32712 DF PROTO=TCP SPT=56248 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0 
Sep 12 17:05:55 lenivpn01 kernel: \[533554.961447\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=121.166.187.237 DST=195.201.121.15 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=32713 DF PROTO=TCP SPT=56248 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0 
Sep 12 17:05:57 lenivpn01 kernel: \[533556.977574\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=121.166.187.237 DST=195.201.121.15 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=32714 DF PROTO=TCP SPT=56248 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0 
...
2019-09-13 04:51:22
103.36.84.180 attackspam
Sep 12 14:02:00 ny01 sshd[9035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.36.84.180
Sep 12 14:02:02 ny01 sshd[9035]: Failed password for invalid user odoo from 103.36.84.180 port 57598 ssh2
Sep 12 14:09:23 ny01 sshd[10350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.36.84.180
2019-09-13 04:27:07
218.92.0.186 attack
Sep 12 19:51:17 hb sshd\[28087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.186  user=root
Sep 12 19:51:18 hb sshd\[28087\]: Failed password for root from 218.92.0.186 port 64142 ssh2
Sep 12 19:51:40 hb sshd\[28108\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.186  user=root
Sep 12 19:51:43 hb sshd\[28108\]: Failed password for root from 218.92.0.186 port 19444 ssh2
Sep 12 19:51:45 hb sshd\[28108\]: Failed password for root from 218.92.0.186 port 19444 ssh2
2019-09-13 04:48:13
84.242.96.142 attackbots
Sep 12 13:03:42 ny01 sshd[30377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.242.96.142
Sep 12 13:03:44 ny01 sshd[30377]: Failed password for invalid user 1q2w3e4r5t6y from 84.242.96.142 port 43354 ssh2
Sep 12 13:09:58 ny01 sshd[31394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.242.96.142
2019-09-13 05:14:06

Recently Reported IPs

198.76.254.251 180.139.67.0 40.107.21.0 237.213.252.121
170.160.225.227 20.106.44.18 146.6.62.138 223.60.222.130
178.120.200.181 146.46.132.160 171.133.74.185 136.175.210.1
212.148.4.255 17.0.0.1 146.251.176.13 208.36.222.121
114.151.173.20 237.98.13.59 163.130.121.215 208.214.122.252