Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Calgary

Region: Alberta

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.34.64.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37749
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.34.64.129.			IN	A

;; AUTHORITY SECTION:
.			261	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024092801 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 29 02:08:28 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 129.64.34.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 129.64.34.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.36.182.244 attackbotsspam
Sep  1 07:25:48 host sshd\[30747\]: Invalid user ftpuser from 54.36.182.244
Sep  1 07:25:48 host sshd\[30747\]: Failed password for invalid user ftpuser from 54.36.182.244 port 46052 ssh2
Sep  1 07:29:15 host sshd\[30889\]: Invalid user hadoop from 54.36.182.244
Sep  1 07:29:15 host sshd\[30889\]: Failed password for invalid user hadoop from 54.36.182.244 port 49260 ssh2
...
2020-09-01 19:52:04
101.51.84.55 attackbotsspam
Unauthorized connection attempt from IP address 101.51.84.55 on Port 445(SMB)
2020-09-01 19:30:47
182.30.124.32 attack
Automatic report - Port Scan Attack
2020-09-01 19:27:22
74.120.14.19 attackspambots
Scanning
2020-09-01 19:31:13
111.93.93.180 normal
Computer ki sayta see ham jivan ki aneak jarurat Puri kar skate hai
2020-09-01 20:13:35
14.166.34.216 attackspambots
Attempted connection to port 445.
2020-09-01 19:41:15
54.161.3.78 attack
Port Scan
2020-09-01 19:31:41
14.165.27.156 attackspam
Attempted connection to port 445.
2020-09-01 19:45:15
110.77.155.53 attack
Unauthorized connection attempt from IP address 110.77.155.53 on Port 445(SMB)
2020-09-01 19:25:55
197.34.132.124 attack
Telnet Honeypot -> Telnet Bruteforce / Login
2020-09-01 20:07:57
41.35.134.110 attack
Telnet Server BruteForce Attack
2020-09-01 20:02:41
162.243.129.99 attack
Unauthorized SSH login attempts
2020-09-01 20:07:08
36.80.154.184 attackspam
Unauthorized connection attempt from IP address 36.80.154.184 on Port 445(SMB)
2020-09-01 20:13:12
211.20.23.114 attackbotsspam
Telnetd brute force attack detected by fail2ban
2020-09-01 19:56:14
201.210.197.191 attack
Attempted connection to port 445.
2020-09-01 19:37:03

Recently Reported IPs

55.173.37.94 60.42.211.127 55.81.195.237 126.178.135.116
87.240.211.144 233.217.10.63 245.17.54.220 75.214.58.239
241.129.52.170 47.254.248.116 238.34.181.19 55.104.55.48
160.152.220.220 253.100.5.157 238.61.109.160 104.121.211.181
217.19.97.87 107.139.186.201 2a01:c23:8c21:5600:399d:c67:ac93:59b1 244.36.172.173