Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Waltham

Region: Massachusetts

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Brandeis University

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.64.118.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2079
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;129.64.118.42.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062701 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 27 23:16:56 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 42.118.64.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 42.118.64.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.63.169.33 attackspambots
Aug 17 22:45:56 raspberrypi sshd\[16673\]: Invalid user agus from 14.63.169.33Aug 17 22:45:58 raspberrypi sshd\[16673\]: Failed password for invalid user agus from 14.63.169.33 port 46531 ssh2Aug 17 23:07:52 raspberrypi sshd\[17897\]: Invalid user indigo from 14.63.169.33
...
2019-08-18 10:47:28
193.32.163.71 attack
firewall-block, port(s): 3319/tcp
2019-08-18 10:42:22
187.1.57.210 attack
Aug 17 20:07:23 thevastnessof sshd[16031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.1.57.210
...
2019-08-18 10:26:51
103.225.143.118 attack
Aug 17 16:22:31 web9 sshd\[15446\]: Invalid user minecraft from 103.225.143.118
Aug 17 16:22:31 web9 sshd\[15446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.225.143.118
Aug 17 16:22:33 web9 sshd\[15446\]: Failed password for invalid user minecraft from 103.225.143.118 port 40012 ssh2
Aug 17 16:28:04 web9 sshd\[16448\]: Invalid user fernando from 103.225.143.118
Aug 17 16:28:04 web9 sshd\[16448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.225.143.118
2019-08-18 10:33:01
51.68.229.59 attackbots
2019-08-18T03:10:07.445383abusebot-3.cloudsearch.cf sshd\[23032\]: Invalid user louie from 51.68.229.59 port 50846
2019-08-18 11:11:19
185.176.27.18 attackbotsspam
Aug 18 03:01:36 h2177944 kernel: \[4413774.297945\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.18 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=29178 PROTO=TCP SPT=58939 DPT=24807 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 18 03:06:01 h2177944 kernel: \[4414039.062103\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.18 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=62935 PROTO=TCP SPT=58939 DPT=26407 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 18 03:42:20 h2177944 kernel: \[4416218.638917\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.18 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=24949 PROTO=TCP SPT=58939 DPT=26107 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 18 03:42:26 h2177944 kernel: \[4416223.726454\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.18 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=9088 PROTO=TCP SPT=58939 DPT=21207 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 18 03:55:10 h2177944 kernel: \[4416987.568128\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.18 DST=85.214.11
2019-08-18 11:02:13
23.129.64.166 attackbotsspam
2019-08-17T04:09:51.284276WS-Zach sshd[32614]: Invalid user 888888 from 23.129.64.166 port 44879
2019-08-17T04:09:51.286079WS-Zach sshd[32614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.166
2019-08-17T04:09:51.284276WS-Zach sshd[32614]: Invalid user 888888 from 23.129.64.166 port 44879
2019-08-17T04:09:52.984105WS-Zach sshd[32614]: Failed password for invalid user 888888 from 23.129.64.166 port 44879 ssh2
2019-08-17T22:05:47.093509WS-Zach sshd[18202]: User root from 23.129.64.166 not allowed because none of user's groups are listed in AllowGroups
...
2019-08-18 10:35:08
128.199.235.131 attackbots
Aug 17 08:32:21 php2 sshd\[6144\]: Invalid user kuku from 128.199.235.131
Aug 17 08:32:21 php2 sshd\[6144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.235.131
Aug 17 08:32:22 php2 sshd\[6144\]: Failed password for invalid user kuku from 128.199.235.131 port 45310 ssh2
Aug 17 08:37:18 php2 sshd\[6624\]: Invalid user adam from 128.199.235.131
Aug 17 08:37:18 php2 sshd\[6624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.235.131
2019-08-18 10:37:38
184.105.247.227 attackspambots
3389/tcp 23/tcp 9200/tcp...
[2019-06-17/08-16]59pkt,17pt.(tcp),3pt.(udp)
2019-08-18 11:09:39
89.106.107.117 attack
Aug 17 09:18:52 hanapaa sshd\[29112\]: Invalid user 123456 from 89.106.107.117
Aug 17 09:18:52 hanapaa sshd\[29112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.106.107.117.unicsbg.net
Aug 17 09:18:54 hanapaa sshd\[29112\]: Failed password for invalid user 123456 from 89.106.107.117 port 40007 ssh2
Aug 17 09:23:48 hanapaa sshd\[29550\]: Invalid user iv from 89.106.107.117
Aug 17 09:23:48 hanapaa sshd\[29550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.106.107.117.unicsbg.net
2019-08-18 10:34:41
103.76.252.6 attackspambots
Aug 17 22:05:30 aat-srv002 sshd[11106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.76.252.6
Aug 17 22:05:32 aat-srv002 sshd[11106]: Failed password for invalid user bscw from 103.76.252.6 port 36321 ssh2
Aug 17 22:07:31 aat-srv002 sshd[11200]: Failed password for root from 103.76.252.6 port 62721 ssh2
...
2019-08-18 11:13:44
198.211.118.157 attackspambots
Aug 17 19:22:56 xtremcommunity sshd\[26778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.118.157  user=root
Aug 17 19:22:58 xtremcommunity sshd\[26778\]: Failed password for root from 198.211.118.157 port 45104 ssh2
Aug 17 19:28:53 xtremcommunity sshd\[26972\]: Invalid user prova from 198.211.118.157 port 35546
Aug 17 19:28:53 xtremcommunity sshd\[26972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.118.157
Aug 17 19:28:54 xtremcommunity sshd\[26972\]: Failed password for invalid user prova from 198.211.118.157 port 35546 ssh2
...
2019-08-18 10:52:48
51.68.141.62 attack
Aug 18 01:21:09 itv-usvr-02 sshd[1356]: Invalid user masumi from 51.68.141.62 port 38606
Aug 18 01:21:09 itv-usvr-02 sshd[1356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.141.62
Aug 18 01:21:09 itv-usvr-02 sshd[1356]: Invalid user masumi from 51.68.141.62 port 38606
Aug 18 01:21:11 itv-usvr-02 sshd[1356]: Failed password for invalid user masumi from 51.68.141.62 port 38606 ssh2
Aug 18 01:25:47 itv-usvr-02 sshd[1366]: Invalid user columbia from 51.68.141.62 port 60526
2019-08-18 10:41:31
103.242.175.78 attackspambots
Aug 17 11:42:30 web9 sshd\[24384\]: Invalid user yw from 103.242.175.78
Aug 17 11:42:30 web9 sshd\[24384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.242.175.78
Aug 17 11:42:32 web9 sshd\[24384\]: Failed password for invalid user yw from 103.242.175.78 port 45262 ssh2
Aug 17 11:46:55 web9 sshd\[25163\]: Invalid user vyatta from 103.242.175.78
Aug 17 11:46:55 web9 sshd\[25163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.242.175.78
2019-08-18 10:44:03
94.102.49.237 attack
Splunk® : port scan detected:
Aug 17 22:57:21 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:64:c3:d6:0b:ef:f0:08:00 SRC=94.102.49.237 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=57138 PROTO=TCP SPT=52228 DPT=8089 WINDOW=1024 RES=0x00 SYN URGP=0
2019-08-18 11:08:05

Recently Reported IPs

80.143.92.184 213.216.139.222 182.69.106.175 211.175.6.199
177.130.138.157 166.46.59.247 80.211.194.162 37.151.112.166
130.73.222.176 101.59.222.14 24.236.91.87 1.70.42.152
32.69.37.136 66.101.0.31 183.82.184.34 40.73.244.133
113.43.147.235 223.145.167.204 117.45.234.228 14.184.108.251