Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Reserved

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.164.99.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52699
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;132.164.99.129.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072401 1800 900 604800 86400

;; Query time: 87 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jul 25 10:49:37 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 129.99.164.132.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 129.99.164.132.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.135.82.106 attackbots
Oct 27 14:37:33 SilenceServices sshd[23033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.135.82.106
Oct 27 14:37:35 SilenceServices sshd[23033]: Failed password for invalid user 117 from 185.135.82.106 port 60202 ssh2
Oct 27 14:41:55 SilenceServices sshd[25882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.135.82.106
2019-10-27 21:44:29
66.249.66.205 attackbotsspam
Automatic report - Banned IP Access
2019-10-27 22:21:26
175.151.92.229 attackbotsspam
Port Scan
2019-10-27 22:24:22
112.186.77.78 attackbotsspam
Oct 27 13:07:38 vpn01 sshd[8485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.77.78
Oct 27 13:07:40 vpn01 sshd[8485]: Failed password for invalid user whois from 112.186.77.78 port 45888 ssh2
...
2019-10-27 21:46:03
106.13.142.115 attack
failed root login
2019-10-27 22:03:25
167.71.60.209 attackbotsspam
Oct 27 19:38:11 areeb-Workstation sshd[4453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.60.209
Oct 27 19:38:13 areeb-Workstation sshd[4453]: Failed password for invalid user mustang1 from 167.71.60.209 port 51642 ssh2
...
2019-10-27 22:22:40
45.114.171.92 attack
Oct 27 08:09:03 DNS-2 sshd[10372]: User r.r from 45.114.171.92 not allowed because not listed in AllowUsers
Oct 27 08:09:03 DNS-2 sshd[10372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.114.171.92  user=r.r
Oct 27 08:09:05 DNS-2 sshd[10372]: Failed password for invalid user r.r from 45.114.171.92 port 60631 ssh2
Oct 27 08:09:07 DNS-2 sshd[10372]: Received disconnect from 45.114.171.92 port 60631:11: Bye Bye [preauth]
Oct 27 08:09:07 DNS-2 sshd[10372]: Disconnected from invalid user r.r 45.114.171.92 port 60631 [preauth]
Oct 27 08:32:10 DNS-2 sshd[11568]: Invalid user abisset from 45.114.171.92 port 45725
Oct 27 08:32:10 DNS-2 sshd[11568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.114.171.92 
Oct 27 08:32:11 DNS-2 sshd[11568]: Failed password for invalid user abisset from 45.114.171.92 port 45725 ssh2
Oct 27 08:32:13 DNS-2 sshd[11568]: Received disconnect from 45.114.171.92 p........
-------------------------------
2019-10-27 21:52:38
49.234.233.164 attackspam
Oct 27 03:24:31 friendsofhawaii sshd\[9791\]: Invalid user a5211314 from 49.234.233.164
Oct 27 03:24:31 friendsofhawaii sshd\[9791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.233.164
Oct 27 03:24:33 friendsofhawaii sshd\[9791\]: Failed password for invalid user a5211314 from 49.234.233.164 port 35542 ssh2
Oct 27 03:30:00 friendsofhawaii sshd\[10255\]: Invalid user general1 from 49.234.233.164
Oct 27 03:30:00 friendsofhawaii sshd\[10255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.233.164
2019-10-27 22:09:23
198.27.116.229 attackbotsspam
Oct 27 13:07:14 vpn01 sshd[8469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.27.116.229
Oct 27 13:07:16 vpn01 sshd[8469]: Failed password for invalid user 1 from 198.27.116.229 port 55160 ssh2
...
2019-10-27 21:59:37
112.85.42.232 attack
2019-10-27T11:04:51.049274wiz-ks3 sshd[1757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232  user=root
2019-10-27T11:04:52.944130wiz-ks3 sshd[1757]: Failed password for root from 112.85.42.232 port 46690 ssh2
2019-10-27T11:04:55.118698wiz-ks3 sshd[1757]: Failed password for root from 112.85.42.232 port 46690 ssh2
2019-10-27T11:04:51.049274wiz-ks3 sshd[1757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232  user=root
2019-10-27T11:04:52.944130wiz-ks3 sshd[1757]: Failed password for root from 112.85.42.232 port 46690 ssh2
2019-10-27T11:04:55.118698wiz-ks3 sshd[1757]: Failed password for root from 112.85.42.232 port 46690 ssh2
2019-10-27T11:04:51.049274wiz-ks3 sshd[1757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232  user=root
2019-10-27T11:04:52.944130wiz-ks3 sshd[1757]: Failed password for root from 112.85.42.232 port 46690 ssh2
2019-10-27T11:04:
2019-10-27 22:16:39
218.240.249.162 attackspam
Oct 27 14:25:57 vps01 sshd[27748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.240.249.162
Oct 27 14:25:59 vps01 sshd[27748]: Failed password for invalid user Harrod from 218.240.249.162 port 26560 ssh2
2019-10-27 21:40:33
217.112.128.145 attack
Postfix RBL failed
2019-10-27 21:47:17
118.24.67.4 attack
"POST /jsc.php HTTP/1.1" 404 0 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:31.0) Gecko/20100101 Firefox/31.0" 0.000071
"POST /605.php HTTP/1.1" 404 0 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:31.0) Gecko/20100101 Firefox/31.0" 0.000065
"POST /whoami.php.php HTTP/1.1" 404 0 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:31.0) Gecko/20100101 Firefox/31.0" 0.000064
2019-10-27 22:03:44
176.56.236.21 attack
Oct 27 12:07:16 *** sshd[4301]: Invalid user cloud from 176.56.236.21
2019-10-27 21:56:25
50.67.178.164 attackspambots
Oct 27 10:00:07 TORMINT sshd\[6132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.67.178.164  user=root
Oct 27 10:00:10 TORMINT sshd\[6132\]: Failed password for root from 50.67.178.164 port 44666 ssh2
Oct 27 10:07:14 TORMINT sshd\[6880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.67.178.164  user=root
...
2019-10-27 22:11:12

Recently Reported IPs

13.80.249.12 201.20.82.102 40.114.73.9 67.129.19.12
185.13.199.162 89.122.177.242 5.40.253.6 115.135.9.168
129.211.75.232 141.98.81.254 36.157.255.14 123.193.48.182
86.125.227.188 187.20.21.122 138.75.171.32 124.156.245.149
218.244.150.6 18.215.251.24 200.160.106.222 191.242.167.204