Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.73.49.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13038
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.73.49.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 04:04:10 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 242.49.73.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.49.73.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
177.184.82.140 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/177.184.82.140/ 
 
 BR - 1H : (84)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN52902 
 
 IP : 177.184.82.140 
 
 CIDR : 177.184.80.0/21 
 
 PREFIX COUNT : 2 
 
 UNIQUE IP COUNT : 4096 
 
 
 ATTACKS DETECTED ASN52902 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2020-03-13 13:45:27 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-03-14 02:38:13
141.226.221.242 attackspam
Feb 16 20:01:14 pi sshd[17346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.226.221.242 
Feb 16 20:01:15 pi sshd[17346]: Failed password for invalid user admin from 141.226.221.242 port 6378 ssh2
2020-03-14 03:11:24
122.51.204.181 attackbots
HTTP/80/443/8080 Probe, BF, WP, Hack -
2020-03-14 03:04:11
180.188.16.64 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-14 03:11:11
142.93.181.214 attackbots
Feb 10 10:49:31 pi sshd[22484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.181.214 
Feb 10 10:49:33 pi sshd[22484]: Failed password for invalid user skj from 142.93.181.214 port 40664 ssh2
2020-03-14 02:38:34
220.177.145.12 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-14 03:19:30
1.4.137.148 attackspambots
Unauthorized connection attempt from IP address 1.4.137.148 on Port 445(SMB)
2020-03-14 02:49:57
116.196.122.200 attackspam
Mar 13 13:19:47 Ubuntu-1404-trusty-64-minimal sshd\[3401\]: Invalid user www1 from 116.196.122.200
Mar 13 13:19:47 Ubuntu-1404-trusty-64-minimal sshd\[3401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.122.200
Mar 13 13:19:49 Ubuntu-1404-trusty-64-minimal sshd\[3401\]: Failed password for invalid user www1 from 116.196.122.200 port 39812 ssh2
Mar 13 13:45:26 Ubuntu-1404-trusty-64-minimal sshd\[25114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.122.200  user=root
Mar 13 13:45:28 Ubuntu-1404-trusty-64-minimal sshd\[25114\]: Failed password for root from 116.196.122.200 port 50018 ssh2
2020-03-14 02:39:02
223.152.94.80 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-14 02:51:51
89.36.162.28 attack
Automatic report - Port Scan Attack
2020-03-14 02:56:57
221.125.253.64 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-14 03:09:16
222.186.15.10 attackspam
Mar 13 19:54:06 *host* sshd\[28249\]: User *user* from 222.186.15.10 not allowed because none of user's groups are listed in AllowGroups
2020-03-14 02:58:15
142.93.101.148 attackbotsspam
Mar 13 14:42:52 lock-38 sshd[38478]: Invalid user administrador from 142.93.101.148 port 35316
Mar 13 14:42:52 lock-38 sshd[38478]: Failed password for invalid user administrador from 142.93.101.148 port 35316 ssh2
Mar 13 14:46:24 lock-38 sshd[38498]: Invalid user bf1942 from 142.93.101.148 port 47250
Mar 13 14:46:24 lock-38 sshd[38498]: Invalid user bf1942 from 142.93.101.148 port 47250
Mar 13 14:46:24 lock-38 sshd[38498]: Failed password for invalid user bf1942 from 142.93.101.148 port 47250 ssh2
...
2020-03-14 02:50:28
206.189.133.187 attackbots
Fail2Ban Ban Triggered (2)
2020-03-14 02:47:44
49.74.219.26 attackspam
Mar 13 11:52:01 home sshd[27416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.74.219.26  user=root
Mar 13 11:52:03 home sshd[27416]: Failed password for root from 49.74.219.26 port 14774 ssh2
Mar 13 11:57:15 home sshd[27461]: Invalid user hh from 49.74.219.26 port 35600
Mar 13 11:57:15 home sshd[27461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.74.219.26
Mar 13 11:57:15 home sshd[27461]: Invalid user hh from 49.74.219.26 port 35600
Mar 13 11:57:17 home sshd[27461]: Failed password for invalid user hh from 49.74.219.26 port 35600 ssh2
Mar 13 11:58:39 home sshd[27495]: Invalid user fd from 49.74.219.26 port 54284
Mar 13 11:58:39 home sshd[27495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.74.219.26
Mar 13 11:58:39 home sshd[27495]: Invalid user fd from 49.74.219.26 port 54284
Mar 13 11:58:41 home sshd[27495]: Failed password for invalid user fd from 49.74.219.26 port 54
2020-03-14 03:02:36

Recently Reported IPs

248.26.227.158 148.97.54.52 84.117.139.255 14.196.36.98
44.201.119.117 216.92.149.137 129.213.89.0 15.25.34.201
17.209.234.96 175.161.181.67 67.41.18.159 103.74.27.102
221.247.95.69 113.64.61.255 19.54.155.167 224.32.182.244
241.61.27.201 62.163.111.71 94.149.72.203 137.46.94.42