Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
149.129.136.90 attackbotsspam
20 attempts against mh-ssh on air
2020-10-03 04:53:48
149.129.136.90 attackbots
20 attempts against mh-ssh on cloud
2020-10-03 00:16:13
149.129.136.90 attackbotsspam
20 attempts against mh-ssh on cloud
2020-10-02 20:47:20
149.129.136.90 attack
20 attempts against mh-ssh on cloud
2020-10-02 17:20:09
149.129.136.90 attackspam
20 attempts against mh-ssh on cloud
2020-10-02 13:42:02
149.129.136.90 attackspam
20 attempts against mh-ssh on light
2020-09-30 08:36:29
149.129.136.90 attack
20 attempts against mh-ssh on light
2020-09-30 01:25:20
149.129.136.90 attack
20 attempts against mh-ssh on light
2020-09-29 17:24:38
149.129.136.211 attackbotsspam
Unauthorised access (Aug  9) SRC=149.129.136.211 LEN=40 PREC=0x20 TTL=47 ID=22338 TCP DPT=8080 WINDOW=50376 SYN
2019-08-09 13:08:37
149.129.136.113 attackspam
Aug  8 02:23:17   DDOS Attack: SRC=149.129.136.113 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=49  DF PROTO=TCP SPT=16456 DPT=80 WINDOW=0 RES=0x00 RST URGP=0
2019-08-08 13:10:26
149.129.136.212 attackbots
[portscan] tcp/23 [TELNET]
*(RWIN=27604)(08050931)
2019-08-05 20:17:24
149.129.136.252 attackspambots
port scan and connect, tcp 23 (telnet)
2019-07-11 22:38:14
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.129.136.165
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12921
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.129.136.165.		IN	A

;; AUTHORITY SECTION:
.			586	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022101100 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 11 22:49:34 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 165.136.129.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 165.136.129.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
124.123.112.222 attackspam
Unauthorized connection attempt detected from IP address 124.123.112.222 to port 445
2020-05-30 00:35:07
168.232.163.62 attack
Unauthorized connection attempt detected from IP address 168.232.163.62 to port 445
2020-05-30 00:33:31
37.54.48.60 attackspam
Unauthorized connection attempt detected from IP address 37.54.48.60 to port 23
2020-05-30 00:15:42
82.49.174.135 attack
Unauthorized connection attempt detected from IP address 82.49.174.135 to port 23
2020-05-30 00:08:46
43.254.151.94 attack
Unauthorized connection attempt detected from IP address 43.254.151.94 to port 9200
2020-05-30 00:14:40
190.4.31.25 attackspambots
Unauthorized connection attempt detected from IP address 190.4.31.25 to port 445
2020-05-30 00:24:33
223.247.34.98 attack
Unauthorized connection attempt detected from IP address 223.247.34.98 to port 2323
2020-05-30 00:17:31
118.44.22.150 attack
Unauthorized connection attempt detected from IP address 118.44.22.150 to port 2323
2020-05-30 00:36:15
5.55.78.243 attack
Unauthorized connection attempt detected from IP address 5.55.78.243 to port 23
2020-05-30 00:16:55
183.109.171.98 attackspambots
Unauthorized connection attempt detected from IP address 183.109.171.98 to port 23
2020-05-30 00:27:57
222.244.166.195 attack
Unauthorized connection attempt detected from IP address 222.244.166.195 to port 8080
2020-05-30 00:54:25
54.92.231.59 attack
Unauthorized connection attempt detected from IP address 54.92.231.59 to port 21
2020-05-30 00:12:04
59.0.204.150 attackbots
2323/tcp
[2020-05-29]1pkt
2020-05-30 00:47:54
74.68.133.81 attackspambots
Unauthorized connection attempt detected from IP address 74.68.133.81 to port 5555
2020-05-30 00:44:19
179.99.16.254 attack
Unauthorized connection attempt detected from IP address 179.99.16.254 to port 8080
2020-05-30 00:29:59

Recently Reported IPs

144.22.135.122 128.90.155.187 128.90.157.85 128.90.167.47
128.90.159.171 139.227.254.135 128.90.158.100 152.246.213.241
144.168.195.182 128.90.160.153 147.148.19.117 128.90.139.143
128.90.171.87 128.90.170.212 192.3.227.160 128.90.165.130
164.92.168.153 141.8.194.181 151.68.92.10 128.90.156.101