Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 143.29.4.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3668
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;143.29.4.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 19:43:20 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 134.4.29.143.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.4.29.143.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.59.46.167 attack
Jul 26 05:44:56 XXX sshd[5577]: Invalid user nicolas from 139.59.46.167 port 37204
2020-07-26 19:12:18
125.124.253.203 attackbotsspam
SSH BruteForce Attack
2020-07-26 19:19:19
145.239.7.78 attack
invalid user admin from 145.239.7.78 port 54930 ssh2
2020-07-26 19:08:26
62.234.74.168 attackspam
Invalid user student2 from 62.234.74.168 port 45828
2020-07-26 19:20:22
27.154.67.151 attackbots
Jul 26 03:51:20 gitlab-tf sshd\[24040\]: Invalid user nexthink from 27.154.67.151Jul 26 03:51:24 gitlab-tf sshd\[24045\]: Invalid user plexuser from 27.154.67.151
...
2020-07-26 19:09:05
157.7.233.185 attackspam
Invalid user emilia from 157.7.233.185 port 22089
2020-07-26 19:31:12
91.183.149.230 attackspam
Unauthorized connection attempt detected from IP address 91.183.149.230 to port 2004
2020-07-26 19:19:47
45.227.253.186 attack
21 attempts against mh-misbehave-ban on float
2020-07-26 18:58:32
207.46.13.85 attack
Automatic report - Banned IP Access
2020-07-26 19:06:15
49.235.87.213 attackspam
invalid user demo from 49.235.87.213 port 53430 ssh2
2020-07-26 19:29:53
223.100.167.105 attackspambots
Jul 26 13:29:54 vps768472 sshd\[1107\]: Invalid user wk from 223.100.167.105 port 44128
Jul 26 13:29:54 vps768472 sshd\[1107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.100.167.105
Jul 26 13:29:56 vps768472 sshd\[1107\]: Failed password for invalid user wk from 223.100.167.105 port 44128 ssh2
...
2020-07-26 18:58:01
222.240.1.0 attackspam
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-07-26 19:34:14
112.85.42.173 attackbotsspam
$f2bV_matches
2020-07-26 18:59:27
116.228.160.20 attack
Jul 26 12:40:13 abendstille sshd\[2847\]: Invalid user user from 116.228.160.20
Jul 26 12:40:13 abendstille sshd\[2847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.228.160.20
Jul 26 12:40:15 abendstille sshd\[2847\]: Failed password for invalid user user from 116.228.160.20 port 47098 ssh2
Jul 26 12:44:17 abendstille sshd\[6592\]: Invalid user test02 from 116.228.160.20
Jul 26 12:44:17 abendstille sshd\[6592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.228.160.20
...
2020-07-26 18:57:40
45.55.222.162 attackbots
SSH Brute Force
2020-07-26 19:17:47

Recently Reported IPs

222.211.230.229 174.195.245.48 55.67.215.242 189.128.116.241
215.64.174.112 145.18.184.246 95.97.129.221 141.239.96.192
172.240.106.101 115.83.185.33 160.57.74.243 6.206.103.61
237.116.201.205 22.2.210.118 162.11.153.94 206.141.242.143
201.228.116.119 74.111.58.115 30.228.5.102 89.149.86.229