Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.7.97.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15101
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.7.97.54.			IN	A

;; AUTHORITY SECTION:
.			164	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 09:06:54 CST 2022
;; MSG SIZE  rcvd: 104
Host info
54.97.7.129.in-addr.arpa domain name pointer m.uh.edu.
54.97.7.129.in-addr.arpa domain name pointer campusnet.uh.edu.
54.97.7.129.in-addr.arpa domain name pointer uh.edu.
54.97.7.129.in-addr.arpa domain name pointer www.uh.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.97.7.129.in-addr.arpa	name = campusnet.uh.edu.
54.97.7.129.in-addr.arpa	name = uh.edu.
54.97.7.129.in-addr.arpa	name = www.uh.edu.
54.97.7.129.in-addr.arpa	name = m.uh.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.100.73 attackspambots
SSH invalid-user multiple login attempts
2020-01-03 08:13:45
123.21.167.74 attackbotsspam
SASL PLAIN auth failed: ruser=...
2020-01-03 08:25:16
40.87.13.191 attackspam
Dec 29 00:51:19 h2027339 sshd[10936]: Did not receive identification string from 40.87.13.191
Dec 29 01:26:15 h2027339 sshd[22514]: Invalid user steam from 40.87.13.191
Dec 29 01:26:16 h2027339 sshd[22516]: Invalid user minecraft from 40.87.13.191
Dec 29 01:26:17 h2027339 sshd[22518]: Invalid user nagios from 40.87.13.191
Dec 29 07:56:50 h2027339 sshd[23478]: Invalid user ts3 from 40.87.13.191
Dec 29 07:56:51 h2027339 sshd[23480]: Invalid user judge from 40.87.13.191
Dec 29 07:56:52 h2027339 sshd[23482]: Invalid user minerhub from 40.87.13.191
Dec 29 07:56:53 h2027339 sshd[23484]: Invalid user drcom from 40.87.13.191
Jan  1 15:18:13 h2027339 sshd[3194]: Invalid user nagios from 40.87.13.191
Jan  1 15:18:14 h2027339 sshd[3196]: Invalid user info from 40.87.13.191
Jan  1 15:18:17 h2027339 sshd[3202]: Invalid user viorel from 40.87.13.191
Jan  1 15:18:18 h2027339 sshd[3204]: Invalid user admin from 40.87.13.191


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=40
2020-01-03 08:10:28
37.59.171.82 attackbotsspam
SASL PLAIN auth failed: ruser=...
2020-01-03 08:21:11
112.252.46.44 attackspam
" "
2020-01-03 08:08:02
156.204.66.221 attackspam
SASL PLAIN auth failed: ruser=...
2020-01-03 08:24:19
83.240.245.242 attackspam
Unauthorized connection attempt detected from IP address 83.240.245.242 to port 22
2020-01-03 08:39:40
177.181.5.71 attackbots
" "
2020-01-03 08:42:13
113.8.194.3 attackbots
SASL PLAIN auth failed: ruser=...
2020-01-03 08:28:12
76.169.198.246 attackspambots
SASL PLAIN auth failed: ruser=...
2020-01-03 08:19:50
58.216.180.210 attackbotsspam
Unauthorised access (Jan  3) SRC=58.216.180.210 LEN=44 TTL=241 ID=63568 TCP DPT=1433 WINDOW=1024 SYN 
Unauthorised access (Jan  2) SRC=58.216.180.210 LEN=44 TTL=241 ID=62179 TCP DPT=1433 WINDOW=1024 SYN
2020-01-03 08:40:07
5.121.133.46 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 02-01-2020 23:05:38.
2020-01-03 08:45:06
159.226.118.47 attackspambots
firewall-block, port(s): 5555/tcp
2020-01-03 08:23:23
198.27.90.106 attackspam
Jan  3 00:03:36 ns382633 sshd\[7379\]: Invalid user name from 198.27.90.106 port 43764
Jan  3 00:03:36 ns382633 sshd\[7379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.27.90.106
Jan  3 00:03:37 ns382633 sshd\[7379\]: Failed password for invalid user name from 198.27.90.106 port 43764 ssh2
Jan  3 00:05:58 ns382633 sshd\[8046\]: Invalid user lpg from 198.27.90.106 port 52949
Jan  3 00:05:58 ns382633 sshd\[8046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.27.90.106
2020-01-03 08:31:55
223.112.69.58 attack
Jan  3 00:57:28 srv-ubuntu-dev3 sshd[118118]: Invalid user vps from 223.112.69.58
Jan  3 00:57:28 srv-ubuntu-dev3 sshd[118118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.112.69.58
Jan  3 00:57:28 srv-ubuntu-dev3 sshd[118118]: Invalid user vps from 223.112.69.58
Jan  3 00:57:30 srv-ubuntu-dev3 sshd[118118]: Failed password for invalid user vps from 223.112.69.58 port 56860 ssh2
Jan  3 01:00:43 srv-ubuntu-dev3 sshd[118342]: Invalid user pokemon from 223.112.69.58
Jan  3 01:00:43 srv-ubuntu-dev3 sshd[118342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.112.69.58
Jan  3 01:00:43 srv-ubuntu-dev3 sshd[118342]: Invalid user pokemon from 223.112.69.58
Jan  3 01:00:45 srv-ubuntu-dev3 sshd[118342]: Failed password for invalid user pokemon from 223.112.69.58 port 53754 ssh2
Jan  3 01:04:02 srv-ubuntu-dev3 sshd[118598]: Invalid user db2inst from 223.112.69.58
...
2020-01-03 08:21:34

Recently Reported IPs

129.69.5.3 129.70.240.4 88.92.161.102 129.70.43.86
129.71.202.42 225.128.1.39 129.79.123.148 129.79.123.149
129.82.103.16 25.112.173.135 129.82.103.64 129.82.103.78
129.82.103.79 129.82.103.91 129.82.103.93 129.85.244.162
129.9.49.58 129.9.49.65 129.93.168.40 129.93.168.41