Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Mexico

Internet Service Provider: unknown

Hostname: unknown

Organization: ITESO, A.C.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.201.129.192
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16854
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;148.201.129.192.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019083102 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Sep 01 01:59:10 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 192.129.201.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 192.129.201.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
85.172.89.213 attack
Unauthorized connection attempt from IP address 85.172.89.213 on Port 445(SMB)
2020-08-17 08:23:32
118.24.234.79 attackbotsspam
Failed password for root from 118.24.234.79 port 58846 ssh2
2020-08-17 07:49:25
198.71.234.35 attack
Automatic report - Banned IP Access
2020-08-17 08:12:08
92.50.239.94 attack
Unauthorized connection attempt from IP address 92.50.239.94 on Port 445(SMB)
2020-08-17 07:56:31
3.89.103.146 attack
Email rejected due to spam filtering
2020-08-17 08:16:54
185.94.213.54 attack
Unauthorized connection attempt from IP address 185.94.213.54 on Port 445(SMB)
2020-08-17 08:09:46
183.141.43.144 attackspambots
Email rejected due to spam filtering
2020-08-17 08:18:26
51.178.24.61 attackbots
(sshd) Failed SSH login from 51.178.24.61 (FR/France/61.ip-51-178-24.eu): 5 in the last 3600 secs
2020-08-17 08:11:54
144.22.108.33 attack
2020-08-17T01:28:59.551411mail.broermann.family sshd[1794]: Failed password for invalid user oracle from 144.22.108.33 port 49638 ssh2
2020-08-17T01:33:21.875641mail.broermann.family sshd[2007]: Invalid user daniel from 144.22.108.33 port 59870
2020-08-17T01:33:21.882358mail.broermann.family sshd[2007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-144-22-108-33.compute.oraclecloud.com
2020-08-17T01:33:21.875641mail.broermann.family sshd[2007]: Invalid user daniel from 144.22.108.33 port 59870
2020-08-17T01:33:23.961696mail.broermann.family sshd[2007]: Failed password for invalid user daniel from 144.22.108.33 port 59870 ssh2
...
2020-08-17 08:22:44
117.208.51.74 attackbotsspam
Unauthorized connection attempt from IP address 117.208.51.74 on Port 445(SMB)
2020-08-17 07:58:36
191.31.104.17 attack
Aug 16 11:09:33 XXX sshd[27381]: Invalid user peu01 from 191.31.104.17 port 27000
2020-08-17 08:20:03
39.152.17.192 attack
Failed password for invalid user ansible from 39.152.17.192 port 6390 ssh2
2020-08-17 08:03:59
192.241.234.53 attack
Automatic report - Banned IP Access
2020-08-17 08:17:54
192.35.169.47 attackbotsspam
9101/tcp 57787/tcp 700/tcp...
[2020-06-16/08-16]296pkt,242pt.(tcp)
2020-08-17 08:24:37
3.85.134.93 attack
Email rejected due to spam filtering
2020-08-17 08:17:17

Recently Reported IPs

111.179.68.222 107.105.173.97 2.195.53.173 150.252.222.133
24.197.6.88 210.23.122.199 209.97.161.177 212.25.101.121
42.196.241.135 188.15.25.234 121.156.254.90 149.202.143.154
144.163.101.240 114.94.3.50 131.90.3.140 194.82.18.155
206.229.169.157 100.217.31.192 115.162.156.169 93.91.219.152