Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       129.46.0.0 - 129.46.255.255
CIDR:           129.46.0.0/16
NetName:        QUALNET
NetHandle:      NET-129-46-0-0-1
Parent:         NET129 (NET-129-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Qualcomm, Inc. (QUALCO)
RegDate:        1987-07-31
Updated:        2021-12-14
Ref:            https://rdap.arin.net/registry/ip/129.46.0.0


OrgName:        Qualcomm, Inc.
OrgId:          QUALCO
Address:        5775 Morehouse Drive
City:           San Diego
StateProv:      CA
PostalCode:     92121-1714
Country:        US
RegDate:        
Updated:        2026-02-11
Ref:            https://rdap.arin.net/registry/entity/QUALCO


OrgAbuseHandle: IPMAN39-ARIN
OrgAbuseName:   IP Management
OrgAbusePhone:  +1-858-658-4357 
OrgAbuseEmail:  arin@qualcomm.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/IPMAN39-ARIN

OrgNOCHandle: IPMAN39-ARIN
OrgNOCName:   IP Management
OrgNOCPhone:  +1-858-658-4357 
OrgNOCEmail:  arin@qualcomm.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/IPMAN39-ARIN

OrgTechHandle: IPMAN39-ARIN
OrgTechName:   IP Management
OrgTechPhone:  +1-858-658-4357 
OrgTechEmail:  arin@qualcomm.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPMAN39-ARIN

OrgRoutingHandle: IPMAN39-ARIN
OrgRoutingName:   IP Management
OrgRoutingPhone:  +1-858-658-4357 
OrgRoutingEmail:  arin@qualcomm.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/IPMAN39-ARIN

OrgDNSHandle: IPMAN39-ARIN
OrgDNSName:   IP Management
OrgDNSPhone:  +1-858-658-4357 
OrgDNSEmail:  arin@qualcomm.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/IPMAN39-ARIN

OrgAbuseHandle: ABUSE9538-ARIN
OrgAbuseName:   ABUSE
OrgAbusePhone:  +1-858-845-7857 
OrgAbuseEmail:  abuse@qualcomm.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9538-ARIN

RTechHandle: ZQ3-ARIN
RTechName:   Hostmaster
RTechPhone:  +1-858-651-0209 
RTechEmail:  hostmast@qualcomm.com
RTechRef:    https://rdap.arin.net/registry/entity/ZQ3-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.46.42.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21306
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.46.42.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032201 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 07:28:10 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 145.42.46.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.42.46.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.186.24 attackbotsspam
Jun 14 00:22:25 piServer sshd[8851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.186.24 
Jun 14 00:22:27 piServer sshd[8851]: Failed password for invalid user qbg from 106.13.186.24 port 50412 ssh2
Jun 14 00:26:07 piServer sshd[9247]: Failed password for root from 106.13.186.24 port 48726 ssh2
...
2020-06-14 06:40:16
50.246.53.29 attackbots
761. On Jun 13 2020 experienced a Brute Force SSH login attempt -> 1 unique times by 50.246.53.29.
2020-06-14 06:45:21
116.228.160.22 attack
...
2020-06-14 06:42:47
195.204.16.82 attackbots
2020-06-13T22:12:47.643844shield sshd\[8101\]: Invalid user zhoulin from 195.204.16.82 port 54766
2020-06-13T22:12:47.648742shield sshd\[8101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.204.16.82
2020-06-13T22:12:50.328998shield sshd\[8101\]: Failed password for invalid user zhoulin from 195.204.16.82 port 54766 ssh2
2020-06-13T22:16:08.555053shield sshd\[9727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.204.16.82  user=root
2020-06-13T22:16:10.161507shield sshd\[9727\]: Failed password for root from 195.204.16.82 port 56682 ssh2
2020-06-14 06:26:47
106.12.178.246 attack
Fail2Ban Ban Triggered
2020-06-14 06:30:11
46.118.80.243 attack
46.118.80.243 - - [13/Jun/2020:23:08:00 +0200] "GET /wp-login.php HTTP/1.1" 302 516
...
2020-06-14 06:45:54
212.70.149.2 attackbots
2020-06-14 01:08:59 dovecot_login authenticator failed for \(User\) \[212.70.149.2\]: 535 Incorrect authentication data \(set_id=xinhua@org.ua\)2020-06-14 01:09:35 dovecot_login authenticator failed for \(User\) \[212.70.149.2\]: 535 Incorrect authentication data \(set_id=zzz@org.ua\)2020-06-14 01:10:13 dovecot_login authenticator failed for \(User\) \[212.70.149.2\]: 535 Incorrect authentication data \(set_id=edi@org.ua\)
...
2020-06-14 06:15:35
27.150.22.44 attackbotsspam
2020-06-13T23:08:01.0531221240 sshd\[1292\]: Invalid user mode from 27.150.22.44 port 45424
2020-06-13T23:08:01.0596681240 sshd\[1292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.150.22.44
2020-06-13T23:08:03.5904601240 sshd\[1292\]: Failed password for invalid user mode from 27.150.22.44 port 45424 ssh2
...
2020-06-14 06:41:06
103.129.220.40 attack
2020-06-13T23:05:14.380075vps751288.ovh.net sshd\[570\]: Invalid user wangfei from 103.129.220.40 port 45354
2020-06-13T23:05:14.390822vps751288.ovh.net sshd\[570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.220.40
2020-06-13T23:05:15.662030vps751288.ovh.net sshd\[570\]: Failed password for invalid user wangfei from 103.129.220.40 port 45354 ssh2
2020-06-13T23:08:06.789857vps751288.ovh.net sshd\[598\]: Invalid user sensu from 103.129.220.40 port 34096
2020-06-13T23:08:06.797964vps751288.ovh.net sshd\[598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.220.40
2020-06-14 06:33:59
14.139.173.199 attack
prod11
...
2020-06-14 06:52:25
111.229.64.133 attackbots
2020-06-13T17:58:10.6814151495-001 sshd[38406]: Failed password for invalid user sunyl from 111.229.64.133 port 47482 ssh2
2020-06-13T18:01:34.1212351495-001 sshd[38616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.64.133  user=root
2020-06-13T18:01:36.0744391495-001 sshd[38616]: Failed password for root from 111.229.64.133 port 59220 ssh2
2020-06-13T18:04:59.9251931495-001 sshd[38712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.64.133  user=root
2020-06-13T18:05:01.6877571495-001 sshd[38712]: Failed password for root from 111.229.64.133 port 42712 ssh2
2020-06-13T18:08:24.9957991495-001 sshd[38890]: Invalid user www from 111.229.64.133 port 54444
...
2020-06-14 06:32:57
218.92.0.145 attackspam
2020-06-14T01:50:02.791791lavrinenko.info sshd[3128]: Failed password for root from 218.92.0.145 port 28482 ssh2
2020-06-14T01:50:08.352517lavrinenko.info sshd[3128]: Failed password for root from 218.92.0.145 port 28482 ssh2
2020-06-14T01:50:12.381324lavrinenko.info sshd[3128]: Failed password for root from 218.92.0.145 port 28482 ssh2
2020-06-14T01:50:17.107406lavrinenko.info sshd[3128]: Failed password for root from 218.92.0.145 port 28482 ssh2
2020-06-14T01:50:22.001366lavrinenko.info sshd[3128]: Failed password for root from 218.92.0.145 port 28482 ssh2
...
2020-06-14 06:50:37
84.17.50.154 attackspam
PHI,WP GET /wp-includes/wlwmanifest.xml
2020-06-14 06:23:58
51.91.100.120 attack
836. On Jun 13 2020 experienced a Brute Force SSH login attempt -> 27 unique times by 51.91.100.120.
2020-06-14 06:40:43
103.92.21.25 attack
Automatic report - XMLRPC Attack
2020-06-14 06:43:32

Recently Reported IPs

121.160.73.75 114.170.171.243 107.80.174.117 192.71.171.180
220.103.180.243 189.124.22.175 148.60.121.63 139.170.148.54
157.65.71.96 103.28.224.162 103.131.219.97 10.87.231.118
10.80.168.235 212.117.78.120 19.249.194.52 193.124.146.204
110.78.154.225 2606:4700:10::6816:1034 2606:4700:10::6814:5424 2606:4700:10::6816:637