Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Surulere

Region: Lagos

Country: Nigeria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.56.96.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35198
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;129.56.96.128.			IN	A

;; AUTHORITY SECTION:
.			329	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102801 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 29 03:21:33 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 128.96.56.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 128.96.56.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
39.68.189.83 attackbotsspam
Found on Block CINS-badguys  / proto=6  .  srcport=48293  .  dstport=23  .     (2307)
2020-09-21 17:21:30
109.244.99.21 attackspambots
Sep 21 04:05:11 *hidden* sshd[661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.244.99.21 user=root Sep 21 04:05:13 *hidden* sshd[661]: Failed password for *hidden* from 109.244.99.21 port 46012 ssh2 Sep 21 04:08:27 *hidden* sshd[725]: Invalid user postgres from 109.244.99.21 port 57610
2020-09-21 17:17:23
87.251.75.8 attackbots
RDP Bruteforce
2020-09-21 16:54:41
36.71.142.108 attack
Sep 20 16:06:48 XXXXXX sshd[5779]: Invalid user sniffer from 36.71.142.108 port 39609
2020-09-21 17:09:33
185.202.1.122 attackspam
RDP Bruteforce
2020-09-21 16:52:35
49.51.134.254 attackbots
firewall-block, port(s): 5353/tcp
2020-09-21 17:01:01
85.209.0.253 attackspam
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-21T09:13:51Z
2020-09-21 17:26:40
213.108.134.146 attackbotsspam
RDP Bruteforce
2020-09-21 16:50:53
61.219.11.153 attack
 TCP (SYN) 61.219.11.153:61513 -> port 1986, len 44
2020-09-21 16:55:28
71.6.233.124 attackbots
[Wed Sep 02 10:09:40 2020] - DDoS Attack From IP: 71.6.233.124 Port: 119
2020-09-21 16:47:39
111.206.250.204 attack
Hit honeypot r.
2020-09-21 17:18:01
175.213.185.129 attack
Sep 20 16:24:49 XXX sshd[4472]: Invalid user admin from 175.213.185.129 port 36512
2020-09-21 17:08:30
183.106.43.239 attackbotsspam
Listed on    abuseat.org plus zen-spamhaus   / proto=6  .  srcport=15235  .  dstport=80  .     (2306)
2020-09-21 17:22:58
119.45.54.166 attack
$f2bV_matches
2020-09-21 17:00:27
61.19.213.167 attackbots
Port probing on unauthorized port 445
2020-09-21 17:09:16

Recently Reported IPs

122.138.64.240 73.1.140.82 199.229.249.143 113.47.24.54
77.190.165.81 187.11.3.233 209.93.86.216 173.235.113.69
95.59.146.18 171.221.124.127 63.103.167.88 128.109.11.28
167.99.195.14 51.223.42.23 206.189.38.104 61.191.107.28
45.125.193.139 159.72.227.225 15.236.233.204 134.231.79.209