Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.169.100.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53528
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.169.100.129.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 18:15:56 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 129.100.169.140.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 140.169.100.129.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
111.40.50.89 attackspam
Jul 18 07:25:06 meumeu sshd[32687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.40.50.89 
Jul 18 07:25:09 meumeu sshd[32687]: Failed password for invalid user cheryl from 111.40.50.89 port 31651 ssh2
Jul 18 07:28:40 meumeu sshd[823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.40.50.89 
...
2019-07-18 13:47:36
119.92.145.9 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-17 02:51:21,093 INFO [shellcode_manager] (119.92.145.9) no match, writing hexdump (6d1cee8d97355b19cb6a9d4a3df05fcf :2240810) - MS17010 (EternalBlue)
2019-07-18 13:22:57
113.164.79.23 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-07-18 13:44:45
107.175.49.206 attack
port scan and connect, tcp 6379 (redis)
2019-07-18 14:08:16
165.22.244.146 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.244.146  user=root
Failed password for root from 165.22.244.146 port 58206 ssh2
Invalid user libuuid from 165.22.244.146 port 56238
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.244.146
Failed password for invalid user libuuid from 165.22.244.146 port 56238 ssh2
2019-07-18 14:05:09
5.135.161.72 attack
Jul 18 07:05:36 mail sshd\[30367\]: Invalid user admin from 5.135.161.72 port 36018
Jul 18 07:05:36 mail sshd\[30367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.161.72
Jul 18 07:05:38 mail sshd\[30367\]: Failed password for invalid user admin from 5.135.161.72 port 36018 ssh2
Jul 18 07:10:06 mail sshd\[31298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.161.72  user=root
Jul 18 07:10:07 mail sshd\[31298\]: Failed password for root from 5.135.161.72 port 34718 ssh2
2019-07-18 13:27:11
177.66.104.238 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-07-18 13:56:15
85.234.126.37 attackspambots
scan z
2019-07-18 13:38:51
142.93.108.200 attack
Jul 18 07:30:31 bouncer sshd\[25163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.108.200  user=root
Jul 18 07:30:34 bouncer sshd\[25163\]: Failed password for root from 142.93.108.200 port 51562 ssh2
Jul 18 07:35:58 bouncer sshd\[25185\]: Invalid user tes from 142.93.108.200 port 50752
...
2019-07-18 14:05:54
212.129.40.213 attack
Jul 18 03:21:35 mail sshd\[681\]: Invalid user 1234 from 212.129.40.213
Jul 18 03:21:35 mail sshd\[681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.40.213
Jul 18 03:21:38 mail sshd\[681\]: Failed password for invalid user 1234 from 212.129.40.213 port 51260 ssh2
...
2019-07-18 13:50:45
180.250.68.243 attackspambots
Unauthorized connection attempt from IP address 180.250.68.243 on Port 445(SMB)
2019-07-18 13:53:58
206.189.132.204 attackspambots
$f2bV_matches
2019-07-18 13:21:15
171.123.216.118 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-18 13:35:02
217.60.231.194 attackspambots
scan z
2019-07-18 14:00:51
14.251.196.183 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-17 02:51:36,949 INFO [shellcode_manager] (14.251.196.183) no match, writing hexdump (a0cd964f09f8b8b75f8d30f33eec53de :12681) - SMB (Unknown)
2019-07-18 13:17:12

Recently Reported IPs

140.182.26.14 229.95.35.23 22.237.47.178 120.31.215.223
80.179.44.147 220.87.128.132 233.123.169.123 187.224.228.234
225.182.183.19 248.173.240.80 195.183.159.40 115.27.44.70
239.159.167.80 36.108.6.57 119.11.210.204 69.177.173.250
56.134.71.129 92.204.209.174 135.102.241.201 99.81.110.180