Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.96.211.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14926
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.96.211.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020900 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 00:42:48 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 138.211.96.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.211.96.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.175.93.23 attack
Jul  6 16:54:58 debian-2gb-nbg1-2 kernel: \[16305906.863639\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.175.93.23 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=18603 PROTO=TCP SPT=46011 DPT=5913 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-06 23:22:46
157.245.163.0 attackspambots
*Port Scan* detected from 157.245.163.0 (US/United States/California/Santa Clara/-). 4 hits in the last 135 seconds
2020-07-06 23:13:43
120.78.93.10 attackbots
scans 7 times in preceeding hours on the ports (in chronological order) 6380 8088 7001 7002 7001 8080 7002
2020-07-06 23:17:10
46.35.19.18 attackbotsspam
Jul  6 16:13:52 meumeu sshd[638392]: Invalid user factorio from 46.35.19.18 port 33401
Jul  6 16:13:52 meumeu sshd[638392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.35.19.18 
Jul  6 16:13:52 meumeu sshd[638392]: Invalid user factorio from 46.35.19.18 port 33401
Jul  6 16:13:54 meumeu sshd[638392]: Failed password for invalid user factorio from 46.35.19.18 port 33401 ssh2
Jul  6 16:18:21 meumeu sshd[638598]: Invalid user xcy from 46.35.19.18 port 60660
Jul  6 16:18:21 meumeu sshd[638598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.35.19.18 
Jul  6 16:18:21 meumeu sshd[638598]: Invalid user xcy from 46.35.19.18 port 60660
Jul  6 16:18:24 meumeu sshd[638598]: Failed password for invalid user xcy from 46.35.19.18 port 60660 ssh2
Jul  6 16:22:36 meumeu sshd[638721]: Invalid user cookie from 46.35.19.18 port 59694
...
2020-07-06 22:48:55
185.175.93.14 attackspambots
scans 11 times in preceeding hours on the ports (in chronological order) 62222 8390 10900 63391 23000 8989 8689 7788 5333 14141 4500 resulting in total of 25 scans from 185.175.93.0/24 block.
2020-07-06 23:23:01
5.196.64.61 attackspam
Jul  6 10:21:42 mx sshd[18155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.64.61
Jul  6 10:21:44 mx sshd[18155]: Failed password for invalid user cosmos from 5.196.64.61 port 43048 ssh2
2020-07-06 22:59:33
83.97.20.164 attack
scans once in preceeding hours on the ports (in chronological order) 1434 resulting in total of 9 scans from 83.97.20.0/24 block.
2020-07-06 23:28:22
88.214.26.53 attack
scans 3 times in preceeding hours on the ports (in chronological order) 33395 33394 33396
2020-07-06 23:20:55
142.93.105.174 attack
scans 2 times in preceeding hours on the ports (in chronological order) 3926 30638
2020-07-06 23:16:14
185.156.73.45 attackbotsspam
scans 2 times in preceeding hours on the ports (in chronological order) 3560 3731 resulting in total of 79 scans from 185.156.72.0/22 block.
2020-07-06 23:24:03
14.18.190.116 attack
Jul  6 16:37:59 OPSO sshd\[25407\]: Invalid user jacky from 14.18.190.116 port 51574
Jul  6 16:37:59 OPSO sshd\[25407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.18.190.116
Jul  6 16:38:01 OPSO sshd\[25407\]: Failed password for invalid user jacky from 14.18.190.116 port 51574 ssh2
Jul  6 16:40:49 OPSO sshd\[26149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.18.190.116  user=root
Jul  6 16:40:51 OPSO sshd\[26149\]: Failed password for root from 14.18.190.116 port 54858 ssh2
2020-07-06 22:51:58
103.253.3.214 attackbotsspam
scans 2 times in preceeding hours on the ports (in chronological order) 20523 20523
2020-07-06 23:19:09
174.138.64.163 attack
scans 2 times in preceeding hours on the ports (in chronological order) 7902 7902
2020-07-06 23:11:53
182.253.22.2 attackbots
Jul  6 13:58:20 ip-172-31-61-156 sshd[6719]: Invalid user test from 182.253.22.2
Jul  6 13:58:20 ip-172-31-61-156 sshd[6719]: Invalid user test from 182.253.22.2
Jul  6 13:58:20 ip-172-31-61-156 sshd[6719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.22.2
Jul  6 13:58:20 ip-172-31-61-156 sshd[6719]: Invalid user test from 182.253.22.2
Jul  6 13:58:21 ip-172-31-61-156 sshd[6719]: Failed password for invalid user test from 182.253.22.2 port 47928 ssh2
...
2020-07-06 22:48:24
91.240.118.113 attackspambots
 TCP (SYN) 91.240.118.113:52372 -> port 3391, len 44
2020-07-06 23:20:32

Recently Reported IPs

169.69.112.39 16.162.47.127 125.146.93.67 186.30.190.241
46.210.246.26 46.18.49.23 208.93.51.186 215.91.174.88
147.186.69.233 235.224.229.55 136.112.42.223 154.209.79.174
152.145.97.12 242.159.141.231 212.152.144.231 224.132.11.212
83.184.180.34 81.148.5.43 240.74.213.221 30.221.136.196