Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.48.66.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45664
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.48.66.2.			IN	A

;; AUTHORITY SECTION:
.			390	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022101801 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 19 05:10:24 CST 2022
;; MSG SIZE  rcvd: 104
Host info
b'Host 2.66.48.129.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
server can't find 129.48.66.2.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
185.143.221.46 attackbots
 TCP (SYN) 185.143.221.46:44121 -> port 8322, len 44
2020-06-09 18:26:14
219.65.39.51 attackbotsspam
Icarus honeypot on github
2020-06-09 18:18:18
118.123.11.175 attackspambots
AbusiveCrawling
2020-06-09 18:32:25
142.93.52.3 attackbots
SSH Login Bruteforce
2020-06-09 18:39:26
68.206.210.97 attackspam
Unauthorized connection attempt detected from IP address 68.206.210.97 to port 2323
2020-06-09 18:13:40
160.153.156.46 attackbots
Automatic report - XMLRPC Attack
2020-06-09 18:39:49
106.13.119.163 attack
Jun  9 07:48:59 fhem-rasp sshd[26921]: Invalid user ferari from 106.13.119.163 port 33074
...
2020-06-09 18:31:53
123.206.51.192 attack
Jun  9 07:23:26 vps46666688 sshd[23093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.51.192
Jun  9 07:23:27 vps46666688 sshd[23093]: Failed password for invalid user omsagent from 123.206.51.192 port 43978 ssh2
...
2020-06-09 18:32:59
97.101.96.191 attackspambots
PowerShell/Ploprolo.A
2020-06-09 18:44:17
114.46.224.153 attackspambots
Port probing on unauthorized port 23
2020-06-09 18:34:30
87.251.74.48 attackspambots
[portscan] tcp/22 [SSH]
[scan/connect: 3 time(s)]
in blocklist.de:'listed [ssh]'
in DroneBL:'listed [Unknown spambot or drone]'
*(RWIN=65535)(06091158)
2020-06-09 18:05:59
45.76.26.13 attack
DATE:2020-06-09 05:49:28, IP:45.76.26.13, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-06-09 18:27:19
91.121.164.188 attackbotsspam
(sshd) Failed SSH login from 91.121.164.188 (FR/France/ns360710.ip-91-121-164.eu): 5 in the last 3600 secs
2020-06-09 18:28:20
85.209.0.103 attack
[portscan] tcp/22 [SSH]
[scan/connect: 2 time(s)]
in blocklist.de:'listed [ssh]'
*(RWIN=65535)(06091158)
2020-06-09 18:19:17
222.186.180.142 attackbots
09.06.2020 10:16:21 SSH access blocked by firewall
2020-06-09 18:21:38

Recently Reported IPs

178.127.198.176 94.230.133.126 37.237.152.208 255.183.168.215
180.48.87.199 233.52.243.46 49.1.114.182 18.74.211.171
139.112.204.93 221.6.112.101 31.200.73.40 105.165.66.158
173.191.201.89 1.218.98.231 157.97.230.108 241.225.147.163
47.129.163.242 99.117.46.0 132.188.142.80 108.38.172.149