Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Fresno

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.8.149.33
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61548
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;129.8.149.33.			IN	A

;; AUTHORITY SECTION:
.			340	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121501 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 16 03:48:21 CST 2019
;; MSG SIZE  rcvd: 116
Host info
33.149.8.129.in-addr.arpa domain name pointer ed169macmini3.soehd.csufresno.edu.
33.149.8.129.in-addr.arpa domain name pointer susanampc.ad.csufresno.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
33.149.8.129.in-addr.arpa	name = susanampc.ad.csufresno.edu.
33.149.8.129.in-addr.arpa	name = ed169macmini3.soehd.csufresno.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
202.91.241.146 attackspambots
Invalid user robyn from 202.91.241.146 port 35482
2020-05-29 03:13:42
150.109.150.65 attackspam
Invalid user vcsa from 150.109.150.65 port 57558
2020-05-29 03:19:45
185.47.65.30 attackbotsspam
May 28 14:39:37 vps46666688 sshd[27645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.47.65.30
May 28 14:39:39 vps46666688 sshd[27645]: Failed password for invalid user nagios from 185.47.65.30 port 56506 ssh2
...
2020-05-29 03:15:41
211.144.69.249 attack
May 28 18:37:25 ip-172-31-62-245 sshd\[28878\]: Failed password for root from 211.144.69.249 port 25309 ssh2\
May 28 18:39:45 ip-172-31-62-245 sshd\[29004\]: Failed password for root from 211.144.69.249 port 44289 ssh2\
May 28 18:42:05 ip-172-31-62-245 sshd\[29042\]: Failed password for root from 211.144.69.249 port 57753 ssh2\
May 28 18:44:22 ip-172-31-62-245 sshd\[29074\]: Invalid user gabi from 211.144.69.249\
May 28 18:44:24 ip-172-31-62-245 sshd\[29074\]: Failed password for invalid user gabi from 211.144.69.249 port 55358 ssh2\
2020-05-29 03:12:17
46.38.255.121 attack
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-05-29 03:08:15
106.13.228.187 attackbotsspam
May 28 19:08:37 sxvn sshd[853261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.228.187
2020-05-29 03:00:41
142.11.206.59 attackspam
SSH brute force
2020-05-29 03:20:16
104.155.213.9 attackspambots
Invalid user lawrence from 104.155.213.9 port 54408
Failed password for invalid user lawrence from 104.155.213.9 port 54408 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=9.213.155.104.bc.googleusercontent.com  user=root
Failed password for root from 104.155.213.9 port 47924 ssh2
Invalid user guest from 104.155.213.9 port 41470
2020-05-29 03:02:53
198.206.243.23 attackbots
5x Failed Password
2020-05-29 03:13:59
81.94.255.5 attackbotsspam
Invalid user yarnall from 81.94.255.5 port 51770
2020-05-29 03:04:51
122.51.27.69 attackspam
Invalid user ventas from 122.51.27.69 port 53076
2020-05-29 02:56:59
106.13.29.92 attackspambots
May 28 14:23:49 plex sshd[15203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.92  user=root
May 28 14:23:52 plex sshd[15203]: Failed password for root from 106.13.29.92 port 34170 ssh2
2020-05-29 03:01:36
154.208.138.104 attack
Invalid user admin from 154.208.138.104 port 56626
2020-05-29 02:52:57
116.6.234.145 attackspam
May 28 19:34:19 host sshd[32464]: Invalid user gdm from 116.6.234.145 port 32308
...
2020-05-29 02:57:51
5.135.161.7 attack
Invalid user landscape from 5.135.161.7 port 59194
2020-05-29 03:09:28

Recently Reported IPs

59.40.200.5 36.192.219.17 79.91.13.195 69.124.112.170
49.94.70.18 5.17.182.13 96.21.119.46 188.99.232.8
101.148.221.70 104.238.45.17 66.153.35.117 46.23.144.248
146.164.37.155 79.7.246.21 77.248.130.143 212.117.19.215
109.68.226.124 212.125.12.213 124.144.5.115 179.181.139.104