Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.129.142.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60596
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;163.129.142.11.			IN	A

;; AUTHORITY SECTION:
.			266	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020043000 1800 900 604800 86400

;; Query time: 107 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 30 23:36:03 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 11.142.129.163.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.142.129.163.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.78.199 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2019-09-16 21:16:54
170.79.154.21 attackspam
Automatic report - Port Scan Attack
2019-09-16 21:15:34
185.35.139.72 attackbotsspam
web-1 [ssh] SSH Attack
2019-09-16 21:03:41
101.206.211.157 attackspambots
2019-09-16T12:26:13.215018abusebot-7.cloudsearch.cf sshd\[12702\]: Invalid user cafe from 101.206.211.157 port 41956
2019-09-16 20:43:04
58.84.23.140 attack
*Port Scan* detected from 58.84.23.140 (IN/India/-). 4 hits in the last 35 seconds
2019-09-16 20:52:35
103.54.28.212 attackspam
email spam
2019-09-16 20:42:30
43.247.156.168 attack
Sep 16 13:37:32 apollo sshd\[22876\]: Invalid user maurta from 43.247.156.168Sep 16 13:37:34 apollo sshd\[22876\]: Failed password for invalid user maurta from 43.247.156.168 port 44945 ssh2Sep 16 13:43:37 apollo sshd\[22893\]: Invalid user pydio from 43.247.156.168
...
2019-09-16 20:39:03
91.236.239.139 attackbotsspam
f2b trigger Multiple SASL failures
2019-09-16 20:40:58
192.210.220.58 attackbotsspam
" "
2019-09-16 21:10:56
159.203.193.37 attackbotsspam
" "
2019-09-16 20:58:16
64.252.182.86 attack
Automatic report generated by Wazuh
2019-09-16 20:57:33
69.161.7.28 attack
Honeypot attack, port: 23, PTR: 69-161-7-28-radius.dynamic.acsalaska.net.
2019-09-16 20:43:47
139.59.128.97 attackspambots
Invalid user user from 139.59.128.97 port 40674
2019-09-16 21:04:50
5.196.64.109 attack
5.196.64.109 - - \[16/Sep/2019:13:50:11 +0200\] "GET /https://www.rhythm-of-motion.de/ HTTP/1.1" 301 819 "-" "Googlebot/2.1 \(+http://www.google.com/bot.html\)"
...
2019-09-16 20:45:55
167.71.140.118 attackbotsspam
Sep 16 14:38:58 ArkNodeAT sshd\[24818\]: Invalid user test2 from 167.71.140.118
Sep 16 14:38:58 ArkNodeAT sshd\[24818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.140.118
Sep 16 14:39:00 ArkNodeAT sshd\[24818\]: Failed password for invalid user test2 from 167.71.140.118 port 52390 ssh2
2019-09-16 21:20:51

Recently Reported IPs

69.195.105.185 189.126.70.202 187.199.48.231 26.140.232.234
185.66.230.206 182.240.198.102 181.225.248.114 171.38.219.115
168.205.57.49 165.22.193.229 144.217.34.151 123.139.189.12
126.132.137.56 185.63.253.194 122.231.43.60 119.96.70.20
118.99.86.223 114.216.189.83 114.109.147.30 38.103.153.99