Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.48.86.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47687
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.48.86.134.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 255 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 01:06:50 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 134.86.48.129.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 129.48.86.134.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
62.234.61.180 attackbots
Invalid user puebra from 62.234.61.180 port 51996
2020-02-27 14:49:33
186.89.100.11 attackbotsspam
Honeypot attack, port: 445, PTR: 186-89-100-11.genericrev.cantv.net.
2020-02-27 15:02:19
148.70.26.85 attackbots
Feb 27 06:48:05 mail sshd\[24128\]: Invalid user alfresco from 148.70.26.85
Feb 27 06:48:05 mail sshd\[24128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.26.85
Feb 27 06:48:07 mail sshd\[24128\]: Failed password for invalid user alfresco from 148.70.26.85 port 48345 ssh2
...
2020-02-27 14:46:42
176.31.250.171 attackspam
Feb 27 06:45:34 localhost sshd\[31301\]: Invalid user rachel from 176.31.250.171 port 59233
Feb 27 06:45:34 localhost sshd\[31301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.250.171
Feb 27 06:45:36 localhost sshd\[31301\]: Failed password for invalid user rachel from 176.31.250.171 port 59233 ssh2
Feb 27 06:57:02 localhost sshd\[31505\]: Invalid user ibpzxz from 176.31.250.171 port 60206
Feb 27 06:57:02 localhost sshd\[31505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.250.171
...
2020-02-27 15:02:38
82.202.212.238 attackspam
Feb 27 07:01:32 silence02 sshd[29157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.202.212.238
Feb 27 07:01:34 silence02 sshd[29157]: Failed password for invalid user accounts from 82.202.212.238 port 56288 ssh2
Feb 27 07:07:58 silence02 sshd[29455]: Failed password for gitlab-runner from 82.202.212.238 port 47888 ssh2
2020-02-27 14:09:00
114.35.207.49 attackspam
Honeypot attack, port: 81, PTR: 114-35-207-49.HINET-IP.hinet.net.
2020-02-27 14:54:50
132.247.28.74 attackbotsspam
Lines containing failures of 132.247.28.74
Feb 27 00:38:44 neweola sshd[30613]: Invalid user yli from 132.247.28.74 port 39628
Feb 27 00:38:44 neweola sshd[30613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.247.28.74 
Feb 27 00:38:46 neweola sshd[30613]: Failed password for invalid user yli from 132.247.28.74 port 39628 ssh2
Feb 27 00:38:46 neweola sshd[30613]: Received disconnect from 132.247.28.74 port 39628:11: Bye Bye [preauth]
Feb 27 00:38:46 neweola sshd[30613]: Disconnected from invalid user yli 132.247.28.74 port 39628 [preauth]
Feb 27 00:46:47 neweola sshd[30967]: Invalid user ubuntu from 132.247.28.74 port 42396
Feb 27 00:46:47 neweola sshd[30967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.247.28.74 
Feb 27 00:46:49 neweola sshd[30967]: Failed password for invalid user ubuntu from 132.247.28.74 port 42396 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.h
2020-02-27 14:23:15
61.147.103.136 attackspam
Portscan or hack attempt detected by psad/fwsnort
2020-02-27 14:55:44
218.92.0.189 attack
02/27/2020-01:49:06.450756 218.92.0.189 Protocol: 6 ET SCAN Potential SSH Scan
2020-02-27 14:49:18
222.186.52.78 attackspam
Feb 27 07:48:54 MK-Soft-VM6 sshd[10351]: Failed password for root from 222.186.52.78 port 47234 ssh2
Feb 27 07:48:58 MK-Soft-VM6 sshd[10351]: Failed password for root from 222.186.52.78 port 47234 ssh2
...
2020-02-27 14:50:24
95.76.59.20 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-27 14:11:21
117.50.10.54 attackspambots
Feb 27 05:46:55 vlre-nyc-1 sshd\[1736\]: Invalid user omn from 117.50.10.54
Feb 27 05:46:55 vlre-nyc-1 sshd\[1736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.10.54
Feb 27 05:46:58 vlre-nyc-1 sshd\[1736\]: Failed password for invalid user omn from 117.50.10.54 port 40404 ssh2
Feb 27 05:48:36 vlre-nyc-1 sshd\[1782\]: Invalid user tony from 117.50.10.54
Feb 27 05:48:36 vlre-nyc-1 sshd\[1782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.10.54
...
2020-02-27 14:15:50
210.18.142.75 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-27 14:13:33
5.234.242.25 attack
Port probing on unauthorized port 8080
2020-02-27 15:04:41
125.161.128.14 attackspam
Honeypot attack, port: 445, PTR: 14.subnet125-161-128.speedy.telkom.net.id.
2020-02-27 14:44:35

Recently Reported IPs

40.228.182.152 234.116.108.100 5.83.67.59 161.9.239.172
44.243.173.5 165.77.96.107 48.51.254.140 255.57.83.44
249.78.252.219 95.206.247.24 9.18.207.105 175.69.88.101
254.155.45.144 14.102.147.76 123.242.198.245 47.13.222.116
32.123.200.91 209.218.203.173 60.159.41.136 247.63.13.126