Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.92.70.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58579
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.92.70.143.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012902 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 11:39:33 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 143.70.92.129.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 129.92.70.143.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
49.234.51.56 attackspambots
Dec 18 20:43:31 php1 sshd\[21829\]: Invalid user 12 from 49.234.51.56
Dec 18 20:43:31 php1 sshd\[21829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.51.56
Dec 18 20:43:33 php1 sshd\[21829\]: Failed password for invalid user 12 from 49.234.51.56 port 56624 ssh2
Dec 18 20:51:22 php1 sshd\[22633\]: Invalid user passwd2222 from 49.234.51.56
Dec 18 20:51:22 php1 sshd\[22633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.51.56
2019-12-19 22:28:51
118.121.206.66 attackbotsspam
Invalid user botmaster from 118.121.206.66 port 14986
2019-12-19 22:33:08
113.160.241.173 attack
1576766389 - 12/19/2019 15:39:49 Host: 113.160.241.173/113.160.241.173 Port: 445 TCP Blocked
2019-12-19 22:41:25
87.246.7.35 attackbots
2019-12-19 22:52:11
211.166.59.79 attackspam
Unauthorised access (Dec 19) SRC=211.166.59.79 LEN=40 TTL=242 ID=46494 TCP DPT=1433 WINDOW=1024 SYN
2019-12-19 22:47:43
186.87.134.185 attackbotsspam
Brute force SMTP login attempts.
2019-12-19 22:40:49
159.65.5.183 attackspambots
Invalid user backup from 159.65.5.183 port 33210
2019-12-19 22:30:08
198.71.239.17 attack
Automatic report - XMLRPC Attack
2019-12-19 23:04:35
139.0.126.193 attack
Dec 19 15:39:51 grey postfix/smtpd\[23398\]: NOQUEUE: reject: RCPT from unknown\[139.0.126.193\]: 554 5.7.1 Service unavailable\; Client host \[139.0.126.193\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[139.0.126.193\]\; from=\ to=\ proto=ESMTP helo=\
...
2019-12-19 22:40:00
115.78.121.251 attackbotsspam
Dec 19 15:39:34 grey postfix/smtpd\[15111\]: NOQUEUE: reject: RCPT from unknown\[115.78.121.251\]: 554 5.7.1 Service unavailable\; Client host \[115.78.121.251\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[115.78.121.251\]\; from=\ to=\ proto=ESMTP helo=\<\[115.78.121.251\]\>
...
2019-12-19 22:54:51
118.122.124.78 attackbots
Dec 19 04:32:29 sachi sshd\[23623\]: Invalid user sattler from 118.122.124.78
Dec 19 04:32:29 sachi sshd\[23623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.122.124.78
Dec 19 04:32:31 sachi sshd\[23623\]: Failed password for invalid user sattler from 118.122.124.78 port 34223 ssh2
Dec 19 04:39:50 sachi sshd\[24415\]: Invalid user rosnan from 118.122.124.78
Dec 19 04:39:50 sachi sshd\[24415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.122.124.78
2019-12-19 22:40:14
122.51.167.47 attackbots
Dec 19 16:00:02 localhost sshd\[6498\]: Invalid user ssw from 122.51.167.47 port 41896
Dec 19 16:00:02 localhost sshd\[6498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.167.47
Dec 19 16:00:03 localhost sshd\[6498\]: Failed password for invalid user ssw from 122.51.167.47 port 41896 ssh2
2019-12-19 23:03:13
202.105.96.91 attack
Dec 19 18:32:08 microserver sshd[25763]: Invalid user saaaa from 202.105.96.91 port 48698
Dec 19 18:32:08 microserver sshd[25763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.105.96.91
Dec 19 18:32:10 microserver sshd[25763]: Failed password for invalid user saaaa from 202.105.96.91 port 48698 ssh2
Dec 19 18:39:37 microserver sshd[26637]: Invalid user 333333 from 202.105.96.91 port 45208
Dec 19 18:39:37 microserver sshd[26637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.105.96.91
2019-12-19 22:51:01
149.202.251.94 attackbots
Brute force attack against VPN service
2019-12-19 22:54:19
138.118.78.239 attackbotsspam
Automatic report - Port Scan Attack
2019-12-19 23:01:28

Recently Reported IPs

69.245.10.36 168.160.6.208 84.110.89.37 215.23.11.250
6.125.130.141 212.116.28.142 248.121.5.179 181.122.254.61
192.54.154.112 61.47.80.115 133.219.142.178 45.62.83.52
203.232.103.8 92.86.169.106 133.19.99.189 58.13.166.198
43.68.83.143 163.96.37.16 240.51.79.161 234.183.76.102