Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Mastic Beach

Region: New York

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.49.139.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1599
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;129.49.139.215.			IN	A

;; AUTHORITY SECTION:
.			207	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122401 1800 900 604800 86400

;; Query time: 122 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 25 03:56:12 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 215.139.49.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 215.139.49.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.145.55.89 attackbotsspam
Nov 20 08:37:50 pornomens sshd\[21671\]: Invalid user berwick from 190.145.55.89 port 36626
Nov 20 08:37:50 pornomens sshd\[21671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.55.89
Nov 20 08:37:53 pornomens sshd\[21671\]: Failed password for invalid user berwick from 190.145.55.89 port 36626 ssh2
...
2019-11-20 15:43:39
169.56.17.185 attack
sshd jail - ssh hack attempt
2019-11-20 15:59:40
104.236.45.171 attackbots
LAMP,DEF GET /wp-login.php
2019-11-20 16:07:49
81.214.220.73 attackspambots
Automatic report - Port Scan Attack
2019-11-20 15:42:41
197.204.22.76 attackbots
Fail2Ban Ban Triggered
2019-11-20 15:40:17
192.99.245.135 attack
$f2bV_matches
2019-11-20 15:46:49
222.188.31.215 attackbots
badbot
2019-11-20 15:52:15
152.249.245.68 attackspam
Nov 20 07:29:52 cp sshd[5304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.249.245.68
2019-11-20 15:41:21
82.208.162.115 attack
Nov 20 08:47:13 lnxweb61 sshd[10789]: Failed password for root from 82.208.162.115 port 33362 ssh2
Nov 20 08:47:13 lnxweb61 sshd[10789]: Failed password for root from 82.208.162.115 port 33362 ssh2
2019-11-20 15:47:38
220.164.232.108 attackspambots
badbot
2019-11-20 15:46:04
183.92.234.66 attack
badbot
2019-11-20 16:07:30
222.186.173.180 attackbots
Nov 20 09:03:39 localhost sshd\[919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180  user=root
Nov 20 09:03:40 localhost sshd\[919\]: Failed password for root from 222.186.173.180 port 11700 ssh2
Nov 20 09:03:43 localhost sshd\[919\]: Failed password for root from 222.186.173.180 port 11700 ssh2
2019-11-20 16:09:25
123.121.93.193 attackspam
badbot
2019-11-20 16:03:56
223.242.228.202 attackspam
badbot
2019-11-20 16:13:31
85.93.20.98 attackspambots
Bruteforcing port 3389 (Remote Desktop) - Exceed maximum 10 attempts/hour
2019-11-20 15:39:43

Recently Reported IPs

119.92.183.248 111.250.161.247 112.10.97.53 67.245.16.181
199.83.93.193 196.62.176.171 112.21.181.201 213.134.37.84
180.148.102.184 185.46.197.77 196.86.85.121 222.239.40.144
198.100.96.220 198.211.106.147 75.205.225.25 90.136.238.86
59.95.237.201 215.176.107.223 208.199.12.170 201.43.241.7