Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.82.133.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41045
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.82.133.136.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 185 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 15:29:48 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 136.133.82.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.133.82.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
1.209.171.64 attackspambots
Aug 16 23:05:25 spiceship sshd\[941\]: Invalid user test from 1.209.171.64
Aug 16 23:05:25 spiceship sshd\[941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.209.171.64
...
2019-08-17 11:06:12
159.203.177.53 attackspambots
Automated report - ssh fail2ban:
Aug 17 04:47:31 authentication failure 
Aug 17 04:47:33 wrong password, user=tuxedo, port=35974, ssh2
2019-08-17 10:58:42
166.111.80.223 attack
WordPress wp-login brute force :: 166.111.80.223 0.188 BYPASS [17/Aug/2019:11:13:45  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-17 11:10:52
202.51.110.214 attackspam
Aug 17 04:41:39 icinga sshd[29336]: Failed password for root from 202.51.110.214 port 53985 ssh2
...
2019-08-17 11:16:15
31.17.27.67 attackbotsspam
Aug 17 00:54:26 XXX sshd[29079]: Invalid user ofsaa from 31.17.27.67 port 48950
2019-08-17 11:34:04
201.182.223.59 attack
2019-08-16T22:15:27.752254abusebot-8.cloudsearch.cf sshd\[24748\]: Invalid user langamin from 201.182.223.59 port 47933
2019-08-17 11:28:12
162.213.159.158 attackbots
WordPress brute force
2019-08-17 11:13:10
201.208.9.197 attack
Unauthorized connection attempt from IP address 201.208.9.197 on Port 445(SMB)
2019-08-17 11:20:26
200.233.138.102 attackspam
Unauthorized connection attempt from IP address 200.233.138.102 on Port 445(SMB)
2019-08-17 11:28:53
73.229.232.218 attackspam
Aug 16 17:26:45 web9 sshd\[28654\]: Invalid user mj from 73.229.232.218
Aug 16 17:26:45 web9 sshd\[28654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.229.232.218
Aug 16 17:26:46 web9 sshd\[28654\]: Failed password for invalid user mj from 73.229.232.218 port 48262 ssh2
Aug 16 17:33:22 web9 sshd\[30148\]: Invalid user owner from 73.229.232.218
Aug 16 17:33:22 web9 sshd\[30148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.229.232.218
2019-08-17 11:34:43
134.209.40.67 attackbots
Aug 17 00:14:45 [munged] sshd[693]: Invalid user kasch from 134.209.40.67 port 52662
Aug 17 00:14:45 [munged] sshd[693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.40.67
2019-08-17 11:09:07
220.135.48.40 attack
Fail2Ban Ban Triggered
2019-08-17 11:36:59
178.187.222.212 attackspambots
Attempts to probe for or exploit a Drupal site on url: /administrator/index.php. Reported by the module https://www.drupal.org/project/abuseipdb.
2019-08-17 11:05:21
124.217.247.142 attack
WordPress brute force
2019-08-17 11:24:16
66.70.188.25 attack
Aug 17 03:28:46 *** sshd[27202]: Invalid user oracle4 from 66.70.188.25
2019-08-17 11:42:10

Recently Reported IPs

216.4.34.99 50.170.208.115 73.144.110.23 161.206.187.153
180.242.215.19 58.55.100.219 252.49.123.125 42.32.234.183
119.179.202.144 179.70.20.154 145.222.14.39 253.142.104.131
194.6.30.204 179.74.201.198 238.176.171.72 40.64.77.97
203.247.26.131 183.63.253.62 57.61.177.74 85.250.166.203