Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.52.100.202
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30508
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.52.100.202.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 07:56:22 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 202.100.52.129.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 129.52.100.202.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
116.59.25.196 attackbots
Invalid user snovelor from 116.59.25.196 port 53176
2020-09-14 22:18:02
118.25.152.169 attackbotsspam
SSH Scan
2020-09-14 21:44:30
117.50.8.157 attackspambots
Sep 14 07:48:47 prox sshd[2631]: Failed password for root from 117.50.8.157 port 47098 ssh2
Sep 14 08:02:04 prox sshd[15606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.8.157
2020-09-14 22:07:23
85.239.35.18 attack
(sshd) Failed SSH login from 85.239.35.18 (RU/Russia/coffeeapp.website): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 14 07:15:10 server sshd[5390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.239.35.18  user=root
Sep 14 07:15:12 server sshd[5390]: Failed password for root from 85.239.35.18 port 46518 ssh2
Sep 14 07:23:08 server sshd[7391]: Invalid user elastic from 85.239.35.18 port 60066
Sep 14 07:23:10 server sshd[7391]: Failed password for invalid user elastic from 85.239.35.18 port 60066 ssh2
Sep 14 07:27:34 server sshd[9411]: Invalid user admin from 85.239.35.18 port 36366
2020-09-14 21:51:00
192.241.173.142 attackspambots
Sep 14 11:12:45 server sshd[21251]: Failed password for root from 192.241.173.142 port 42389 ssh2
Sep 14 11:20:48 server sshd[23481]: Failed password for invalid user nagesh from 192.241.173.142 port 56564 ssh2
Sep 14 11:28:53 server sshd[25784]: Failed password for root from 192.241.173.142 port 42596 ssh2
2020-09-14 21:48:31
42.118.121.252 attackspambots
2020-09-14T20:08:24.373954hostname sshd[70063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.118.121.252  user=root
2020-09-14T20:08:26.670612hostname sshd[70063]: Failed password for root from 42.118.121.252 port 22598 ssh2
...
2020-09-14 22:23:05
85.51.12.244 attack
2020-09-14T10:45:42.815587centos sshd[10343]: Failed password for root from 85.51.12.244 port 50318 ssh2
2020-09-14T10:47:46.230626centos sshd[10461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.51.12.244  user=root
2020-09-14T10:47:48.705243centos sshd[10461]: Failed password for root from 85.51.12.244 port 56488 ssh2
...
2020-09-14 21:54:02
45.129.33.16 attack
 TCP (SYN) 45.129.33.16:55196 -> port 17856, len 44
2020-09-14 21:46:45
222.186.173.183 attackbots
2020-09-14T14:13:00.574803vps1033 sshd[4625]: Failed password for root from 222.186.173.183 port 62440 ssh2
2020-09-14T14:13:04.067186vps1033 sshd[4625]: Failed password for root from 222.186.173.183 port 62440 ssh2
2020-09-14T14:13:07.788251vps1033 sshd[4625]: Failed password for root from 222.186.173.183 port 62440 ssh2
2020-09-14T14:13:11.408276vps1033 sshd[4625]: Failed password for root from 222.186.173.183 port 62440 ssh2
2020-09-14T14:13:15.407316vps1033 sshd[4625]: Failed password for root from 222.186.173.183 port 62440 ssh2
...
2020-09-14 22:15:06
115.99.197.91 attack
Port probing on unauthorized port 23
2020-09-14 21:47:57
128.199.85.141 attack
Sep 14 11:21:31 ourumov-web sshd\[8982\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.85.141  user=root
Sep 14 11:21:33 ourumov-web sshd\[8982\]: Failed password for root from 128.199.85.141 port 53718 ssh2
Sep 14 11:25:44 ourumov-web sshd\[9248\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.85.141  user=root
...
2020-09-14 21:57:48
117.69.188.17 attack
Sep 13 20:36:33 srv01 postfix/smtpd\[8700\]: warning: unknown\[117.69.188.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 13 20:39:59 srv01 postfix/smtpd\[23344\]: warning: unknown\[117.69.188.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 13 20:43:25 srv01 postfix/smtpd\[15615\]: warning: unknown\[117.69.188.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 13 20:46:51 srv01 postfix/smtpd\[15615\]: warning: unknown\[117.69.188.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 13 20:50:17 srv01 postfix/smtpd\[14316\]: warning: unknown\[117.69.188.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-14 21:52:53
129.204.245.6 attackbotsspam
Sep 14 12:26:52 localhost sshd[3661337]: Failed password for invalid user csop from 129.204.245.6 port 42184 ssh2
Sep 14 12:31:14 localhost sshd[3670447]: Invalid user ubnt from 129.204.245.6 port 33342
Sep 14 12:31:14 localhost sshd[3670447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.245.6 
Sep 14 12:31:14 localhost sshd[3670447]: Invalid user ubnt from 129.204.245.6 port 33342
Sep 14 12:31:16 localhost sshd[3670447]: Failed password for invalid user ubnt from 129.204.245.6 port 33342 ssh2
...
2020-09-14 22:22:14
169.239.108.52 attackbots
Unauthorised access (Sep 13) SRC=169.239.108.52 LEN=52 PREC=0x20 TTL=115 ID=619 DF TCP DPT=445 WINDOW=8192 SYN
2020-09-14 21:55:57
177.69.237.54 attackbots
Sep 14 13:41:16 MainVPS sshd[5217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.237.54  user=mysql
Sep 14 13:41:17 MainVPS sshd[5217]: Failed password for mysql from 177.69.237.54 port 45468 ssh2
Sep 14 13:47:52 MainVPS sshd[20238]: Invalid user browser from 177.69.237.54 port 58848
Sep 14 13:47:52 MainVPS sshd[20238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.237.54
Sep 14 13:47:52 MainVPS sshd[20238]: Invalid user browser from 177.69.237.54 port 58848
Sep 14 13:47:53 MainVPS sshd[20238]: Failed password for invalid user browser from 177.69.237.54 port 58848 ssh2
...
2020-09-14 21:51:35

Recently Reported IPs

176.235.163.95 93.94.210.6 30.88.250.180 214.239.179.171
44.109.87.224 37.1.54.253 38.130.71.246 53.225.241.94
52.74.235.210 75.202.11.42 224.7.88.213 19.119.241.216
132.126.111.230 99.145.2.171 109.154.200.57 160.22.249.179
150.71.239.152 43.205.167.197 91.192.190.131 65.106.72.50