Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.145.129.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27736
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.145.129.21.			IN	A

;; AUTHORITY SECTION:
.			122	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023010400 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 04 17:46:28 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 21.129.145.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.129.145.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
78.85.49.119 attackspambots
Chat Spam
2019-10-22 15:09:34
103.37.82.118 attack
Sent mail to target address hacked/leaked from abandonia in 2016
2019-10-22 14:52:15
78.29.41.121 attack
UTC: 2019-10-21 port: 80/tcp
2019-10-22 14:56:55
41.230.17.220 attackbots
UTC: 2019-10-21 port: 23/tcp
2019-10-22 15:19:54
159.203.201.196 attackbots
UTC: 2019-10-21 port: 264/tcp
2019-10-22 15:07:13
51.75.134.211 attackspambots
UTC: 2019-10-21 port: 22/tcp
2019-10-22 15:16:16
27.76.101.1 attackspambots
Brute force attempt
2019-10-22 14:50:14
190.14.240.74 attackspambots
Oct 22 06:50:19 www5 sshd\[3484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.14.240.74  user=root
Oct 22 06:50:20 www5 sshd\[3484\]: Failed password for root from 190.14.240.74 port 54432 ssh2
Oct 22 06:54:25 www5 sshd\[4153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.14.240.74  user=root
...
2019-10-22 15:08:24
114.237.155.106 attackbotsspam
Brute force SMTP login attempts.
2019-10-22 14:49:29
5.135.181.11 attackspambots
2019-10-22T02:03:30.770848ns525875 sshd\[2074\]: Invalid user yw from 5.135.181.11 port 52264
2019-10-22T02:03:30.777611ns525875 sshd\[2074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3010967.ip-5-135-181.eu
2019-10-22T02:03:32.845436ns525875 sshd\[2074\]: Failed password for invalid user yw from 5.135.181.11 port 52264 ssh2
2019-10-22T02:08:21.157128ns525875 sshd\[8159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3010967.ip-5-135-181.eu  user=root
...
2019-10-22 15:18:49
2.177.228.74 attack
UTC: 2019-10-21 port: 23/tcp
2019-10-22 15:06:23
189.7.25.34 attackspam
2019-10-21T23:49:31.328976ns525875 sshd\[816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.25.34  user=root
2019-10-21T23:49:33.207811ns525875 sshd\[816\]: Failed password for root from 189.7.25.34 port 58517 ssh2
2019-10-21T23:54:20.173395ns525875 sshd\[6759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.25.34  user=root
2019-10-21T23:54:22.394646ns525875 sshd\[6759\]: Failed password for root from 189.7.25.34 port 49596 ssh2
...
2019-10-22 15:14:09
129.213.172.170 attackbotsspam
Oct 22 05:54:26 ns37 sshd[24658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.172.170
2019-10-22 15:11:46
193.70.2.117 attackbots
*Port Scan* detected from 193.70.2.117 (FR/France/117.ip-193-70-2.eu). 4 hits in the last 10 seconds
2019-10-22 14:58:56
106.13.48.184 attackspambots
detected by Fail2Ban
2019-10-22 15:15:16

Recently Reported IPs

134.176.159.42 68.8.43.161 134.115.3.128 133.89.155.173
133.27.254.141 132.60.188.179 132.28.161.92 131.2.42.206
131.2.29.229 130.98.211.1 131.112.27.185 130.62.27.36
130.24.158.145 130.216.146.156 130.141.123.27 13.223.84.104
13.187.88.70 129.0.3.28 128.239.92.196 128.48.143.162