Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Houston

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.7.17.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44016
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.7.17.53.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010602 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 07 11:52:57 CST 2025
;; MSG SIZE  rcvd: 104
Host info
53.17.7.129.in-addr.arpa domain name pointer uh-fw-129-7-17-53.it.uh.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
53.17.7.129.in-addr.arpa	name = uh-fw-129-7-17-53.it.uh.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
151.80.41.64 attackspam
Invalid user admin from 151.80.41.64 port 59162
2020-05-11 07:33:41
103.48.80.159 attack
May 11 00:21:40 piServer sshd[1348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.80.159 
May 11 00:21:42 piServer sshd[1348]: Failed password for invalid user deploy from 103.48.80.159 port 60446 ssh2
May 11 00:26:24 piServer sshd[1706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.80.159 
...
2020-05-11 07:22:02
131.108.166.146 attackbots
Invalid user steven from 131.108.166.146 port 38186
2020-05-11 07:19:31
218.94.23.132 attackbots
Invalid user admin from 218.94.23.132 port 45670
2020-05-11 07:25:24
121.229.14.191 attackspambots
SSH Brute Force
2020-05-11 07:39:24
139.198.191.217 attack
May 10 22:41:11 ip-172-31-61-156 sshd[25405]: Invalid user ram from 139.198.191.217
May 10 22:41:13 ip-172-31-61-156 sshd[25405]: Failed password for invalid user ram from 139.198.191.217 port 54390 ssh2
May 10 22:41:11 ip-172-31-61-156 sshd[25405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.217
May 10 22:41:11 ip-172-31-61-156 sshd[25405]: Invalid user ram from 139.198.191.217
May 10 22:41:13 ip-172-31-61-156 sshd[25405]: Failed password for invalid user ram from 139.198.191.217 port 54390 ssh2
...
2020-05-11 07:12:49
111.161.74.105 attackspambots
SSH Brute Force
2020-05-11 07:21:46
52.36.22.172 attackspambots
52.36.22.172 - - [10/May/2020:22:30:03 +0200] "GET /0.1.1.sql
2020-05-11 07:07:26
134.209.185.131 attack
SSH Brute Force
2020-05-11 07:35:52
122.51.154.172 attackbotsspam
May 11 00:05:06 sip sshd[6576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.154.172
May 11 00:05:09 sip sshd[6576]: Failed password for invalid user sqlsrv from 122.51.154.172 port 59670 ssh2
May 11 00:18:16 sip sshd[11455]: Failed password for root from 122.51.154.172 port 59250 ssh2
2020-05-11 07:07:57
102.37.12.59 attackbots
May 11 00:15:38 piServer sshd[826]: Failed password for root from 102.37.12.59 port 1088 ssh2
May 11 00:20:34 piServer sshd[1263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.37.12.59 
May 11 00:20:35 piServer sshd[1263]: Failed password for invalid user adam from 102.37.12.59 port 1088 ssh2
...
2020-05-11 07:06:13
132.232.102.155 attackspam
SSH Brute Force
2020-05-11 07:36:56
118.24.90.64 attack
Triggered by Fail2Ban at Ares web server
2020-05-11 07:15:03
140.143.88.129 attackspam
May 10 19:33:55: Invalid user admissions from 140.143.88.129 port 42534
2020-05-11 07:06:58
106.12.181.144 attack
May 10 20:01:04 vps46666688 sshd[31088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.181.144
May 10 20:01:07 vps46666688 sshd[31088]: Failed password for invalid user himanshu from 106.12.181.144 port 53962 ssh2
...
2020-05-11 07:42:55

Recently Reported IPs

249.66.213.186 166.179.214.147 26.236.29.103 223.194.35.168
193.183.202.190 9.123.117.21 22.230.161.134 127.163.99.65
66.197.69.132 17.241.209.249 101.163.187.67 27.87.130.221
116.31.73.18 242.236.47.192 85.98.205.105 87.91.79.20
218.171.194.249 34.70.63.72 157.190.92.107 74.65.29.246