Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Algeria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.45.52.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 661
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.45.52.146.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 14:59:35 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 146.52.45.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 146.52.45.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.78.74.81 attackspam
Unauthorized connection attempt detected from IP address 80.78.74.81 to port 445
2020-06-13 05:57:21
49.234.230.108 attackbotsspam
Unauthorized connection attempt detected from IP address 49.234.230.108 to port 80
2020-06-13 06:02:24
179.25.134.103 attack
Automatic report - Port Scan Attack
2020-06-13 06:13:07
58.59.111.190 attackspam
Tried our host z.
2020-06-13 06:01:06
221.13.12.79 attack
Unauthorized connection attempt detected from IP address 221.13.12.79 to port 123
2020-06-13 06:05:18
190.136.223.16 attackspam
Unauthorized connection attempt detected from IP address 190.136.223.16 to port 23
2020-06-13 06:08:09
73.46.147.15 attack
Unauthorized connection attempt detected from IP address 73.46.147.15 to port 8000
2020-06-13 06:00:16
125.71.201.50 attack
Unauthorized connection attempt detected from IP address 125.71.201.50 to port 445
2020-06-13 05:47:58
181.114.238.193 attackbotsspam
Unauthorized connection attempt detected from IP address 181.114.238.193 to port 8000
2020-06-13 05:45:08
117.215.150.157 attackspam
Unauthorized connection attempt detected from IP address 117.215.150.157 to port 23
2020-06-13 05:49:41
93.29.187.145 attackbots
Jun 12 18:44:07 rush sshd[11161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.29.187.145
Jun 12 18:44:10 rush sshd[11161]: Failed password for invalid user zhucm from 93.29.187.145 port 40132 ssh2
Jun 12 18:47:53 rush sshd[11213]: Failed password for root from 93.29.187.145 port 34254 ssh2
...
2020-06-13 05:35:59
190.186.48.187 attackspambots
Unauthorized connection attempt detected from IP address 190.186.48.187 to port 8080
2020-06-13 06:07:40
27.125.9.122 attack
Unauthorized connection attempt detected from IP address 27.125.9.122 to port 2480
2020-06-13 06:03:37
46.165.245.154 attack
Multiple web server 500 error code (Internal Error).
2020-06-13 05:36:59
79.10.86.203 attackspam
firewall-block, port(s): 8000/tcp
2020-06-13 05:59:13

Recently Reported IPs

14.186.233.141 120.243.13.148 185.7.130.222 191.25.25.1
23.20.28.158 23.224.189.13 186.237.19.50 167.94.145.19
3.88.48.81 93.168.113.44 58.221.239.45 91.103.252.119
176.62.86.178 131.161.60.1 14.118.135.106 35.231.192.74
110.39.146.174 45.63.117.130 103.248.210.3 170.210.203.212