Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jakarta

Region: Jakarta Raya

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.75.71.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9632
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.75.71.129.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024112901 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 30 04:52:59 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 129.71.75.146.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 129.71.75.146.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
195.182.153.242 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-21 15:38:36
123.18.74.125 attackbotsspam
445/tcp 445/tcp 445/tcp
[2019-06-21]3pkt
2019-06-21 15:43:31
94.197.121.199 attackbots
Port scan on 1 port(s): 445
2019-06-21 15:22:12
189.90.112.182 attack
8080/tcp
[2019-06-21]1pkt
2019-06-21 15:08:15
108.163.251.66 attackspambots
Blocking for trying to access an exploit file: /content-post.php
2019-06-21 15:34:44
37.212.196.23 attack
¯\_(ツ)_/¯
2019-06-21 15:06:44
167.86.120.109 attackspambots
Port scan attempt detected by AWS-CCS, CTS, India
2019-06-21 15:10:07
5.83.183.127 attackbotsspam
Jun 21 06:34:20 reporting4 sshd[19163]: Invalid user plexuser from 5.83.183.127
Jun 21 06:34:20 reporting4 sshd[19163]: Failed none for invalid user plexuser from 5.83.183.127 port 55280 ssh2
Jun 21 06:34:22 reporting4 sshd[19163]: Failed password for invalid user plexuser from 5.83.183.127 port 55280 ssh2
Jun 21 06:35:46 reporting4 sshd[19844]: Invalid user openhabian from 5.83.183.127
Jun 21 06:35:46 reporting4 sshd[19844]: Failed none for invalid user openhabian from 5.83.183.127 port 36237 ssh2
Jun 21 06:35:46 reporting4 sshd[19844]: Failed password for invalid user openhabian from 5.83.183.127 port 36237 ssh2
Jun 21 06:35:49 reporting4 sshd[20678]: Invalid user admin from 5.83.183.127
Jun 21 06:35:49 reporting4 sshd[20678]: Failed none for invalid user admin from 5.83.183.127 port 45665 ssh2
Jun 21 06:35:50 reporting4 sshd[20678]: Failed password for invalid user admin from 5.83.183.127 port 45665 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=5.8
2019-06-21 15:07:14
1.202.112.77 attackspambots
20000/udp
[2019-06-21]1pkt
2019-06-21 15:14:39
190.179.27.255 attackbots
23/tcp
[2019-06-21]1pkt
2019-06-21 14:58:44
171.221.242.85 attackspam
Unauthorised access (Jun 21) SRC=171.221.242.85 LEN=40 TTL=52 ID=49281 TCP DPT=23 WINDOW=33652 SYN
2019-06-21 15:08:37
31.31.77.14 attack
xmlrpc attack
2019-06-21 15:19:06
61.163.159.200 attack
5500/tcp
[2019-06-21]1pkt
2019-06-21 15:04:34
119.118.103.84 attackspambots
23/tcp
[2019-06-21]1pkt
2019-06-21 15:09:05
77.157.10.171 attackspambots
8080/tcp
[2019-06-21]1pkt
2019-06-21 15:05:35

Recently Reported IPs

17.245.39.141 137.61.128.141 4.120.36.22 253.4.122.185
172.133.189.65 205.194.245.0 20.73.73.172 172.12.180.156
43.95.60.223 220.42.52.166 125.73.219.23 125.10.0.121
249.203.112.242 74.246.27.60 52.167.144.173 63.114.110.167
232.140.83.47 4.73.168.100 218.158.125.23 192.168.43.155