Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.121.172.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15953
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.121.172.129.		IN	A

;; AUTHORITY SECTION:
.			567	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022012301 1800 900 604800 86400

;; Query time: 174 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 24 06:09:52 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 129.172.121.194.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 194.121.172.129.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
185.209.0.32 attackspam
(Sep 26)  LEN=40 TTL=247 ID=49000 TCP DPT=3389 WINDOW=1024 SYN 
 (Sep 26)  LEN=40 TTL=247 ID=19186 TCP DPT=3389 WINDOW=1024 SYN 
 (Sep 26)  LEN=40 TTL=247 ID=14844 TCP DPT=3389 WINDOW=1024 SYN 
 (Sep 26)  LEN=40 TTL=247 ID=7558 TCP DPT=3389 WINDOW=1024 SYN 
 (Sep 26)  LEN=40 TTL=247 ID=36262 TCP DPT=3389 WINDOW=1024 SYN 
 (Sep 26)  LEN=40 TTL=247 ID=24539 TCP DPT=3389 WINDOW=1024 SYN 
 (Sep 26)  LEN=40 TTL=247 ID=33066 TCP DPT=3389 WINDOW=1024 SYN 
 (Sep 26)  LEN=40 TTL=247 ID=23794 TCP DPT=3389 WINDOW=1024 SYN 
 (Sep 26)  LEN=40 TTL=247 ID=62925 TCP DPT=3389 WINDOW=1024 SYN 
 (Sep 26)  LEN=40 TTL=247 ID=49342 TCP DPT=3389 WINDOW=1024 SYN 
 (Sep 26)  LEN=40 TTL=247 ID=59856 TCP DPT=3389 WINDOW=1024 SYN 
 (Sep 26)  LEN=40 TTL=247 ID=54767 TCP DPT=3389 WINDOW=1024 SYN 
 (Sep 26)  LEN=40 TTL=247 ID=11403 TCP DPT=3389 WINDOW=1024 SYN 
 (Sep 26)  LEN=40 TTL=247 ID=27033 TCP DPT=3389 WINDOW=1024 SYN 
 (Sep 25)  LEN=40 TTL=247 ID=29564 TCP DPT=3389 WINDOW=1024 SYN 
 (Sep 25)  LEN=40 TTL=247 ...
2019-09-26 23:20:57
40.112.248.127 attackspam
2019-09-26T11:02:40.8094381495-001 sshd\[12189\]: Failed password for invalid user ke from 40.112.248.127 port 59840 ssh2
2019-09-26T11:13:31.4986341495-001 sshd\[13073\]: Invalid user knoxville from 40.112.248.127 port 10600
2019-09-26T11:13:31.5068551495-001 sshd\[13073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.112.248.127
2019-09-26T11:13:33.5373291495-001 sshd\[13073\]: Failed password for invalid user knoxville from 40.112.248.127 port 10600 ssh2
2019-09-26T11:19:20.6264521495-001 sshd\[13479\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.112.248.127  user=root
2019-09-26T11:19:22.2353351495-001 sshd\[13479\]: Failed password for root from 40.112.248.127 port 24504 ssh2
...
2019-09-26 23:37:42
222.186.173.154 attackbotsspam
Sep 26 17:26:05 dedicated sshd[9763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
Sep 26 17:26:07 dedicated sshd[9763]: Failed password for root from 222.186.173.154 port 8852 ssh2
2019-09-26 23:30:14
149.202.206.206 attack
2019-09-26T15:14:25.570858abusebot-2.cloudsearch.cf sshd\[22178\]: Invalid user diao from 149.202.206.206 port 41623
2019-09-26 23:29:51
150.95.54.138 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-09-26 23:45:29
136.243.70.151 attackbotsspam
20 attempts against mh-misbehave-ban on pluto.magehost.pro
2019-09-26 23:09:02
223.255.7.83 attackspambots
2019-09-26T17:53:05.076833tmaserv sshd\[11897\]: Failed password for invalid user nang from 223.255.7.83 port 49768 ssh2
2019-09-26T18:08:13.674832tmaserv sshd\[12745\]: Invalid user test from 223.255.7.83 port 32913
2019-09-26T18:08:13.680747tmaserv sshd\[12745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.255.7.83
2019-09-26T18:08:15.720838tmaserv sshd\[12745\]: Failed password for invalid user test from 223.255.7.83 port 32913 ssh2
2019-09-26T18:15:46.275635tmaserv sshd\[13227\]: Invalid user se from 223.255.7.83 port 52723
2019-09-26T18:15:46.281021tmaserv sshd\[13227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.255.7.83
...
2019-09-26 23:28:11
150.109.113.127 attackbots
Sep 26 11:02:21 TORMINT sshd\[15120\]: Invalid user web from 150.109.113.127
Sep 26 11:02:21 TORMINT sshd\[15120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.113.127
Sep 26 11:02:23 TORMINT sshd\[15120\]: Failed password for invalid user web from 150.109.113.127 port 38296 ssh2
...
2019-09-26 23:46:46
157.55.39.122 attackspambots
Automatic report - Banned IP Access
2019-09-26 23:32:14
96.224.254.240 attack
Sep 26 16:49:11 bouncer sshd\[12909\]: Invalid user 1990 from 96.224.254.240 port 59114
Sep 26 16:49:11 bouncer sshd\[12909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.224.254.240 
Sep 26 16:49:14 bouncer sshd\[12909\]: Failed password for invalid user 1990 from 96.224.254.240 port 59114 ssh2
...
2019-09-26 23:42:23
187.216.113.99 attackspam
Sep 26 17:01:07 lnxmail61 postfix/smtpd[22160]: warning: unknown[187.216.113.99]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 26 17:01:07 lnxmail61 postfix/smtpd[22160]: lost connection after AUTH from unknown[187.216.113.99]
Sep 26 17:01:44 lnxmail61 postfix/smtpd[22160]: warning: unknown[187.216.113.99]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 26 17:01:44 lnxmail61 postfix/smtpd[22160]: lost connection after AUTH from unknown[187.216.113.99]
Sep 26 17:02:56 lnxmail61 postfix/smtpd[20425]: warning: unknown[187.216.113.99]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 26 17:02:56 lnxmail61 postfix/smtpd[20425]: lost connection after AUTH from unknown[187.216.113.99]
2019-09-26 23:46:20
157.245.103.64 attackspambots
Sep 26 10:10:22 aat-srv002 sshd[13192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.103.64
Sep 26 10:10:25 aat-srv002 sshd[13192]: Failed password for invalid user cloud from 157.245.103.64 port 36600 ssh2
Sep 26 10:15:01 aat-srv002 sshd[13314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.103.64
Sep 26 10:15:03 aat-srv002 sshd[13314]: Failed password for invalid user ok from 157.245.103.64 port 49248 ssh2
...
2019-09-26 23:23:05
222.186.15.101 attackspam
2019-09-26T10:38:13.339602Z \[cowrie.ssh.factory.CowrieSSHFactory\] New connection: 222.186.15.101:35736 \(107.175.91.48:22\) \[session: d43361ed94c2\]
2019-09-26T15:08:46.842704Z \[cowrie.ssh.factory.CowrieSSHFactory\] New connection: 222.186.15.101:56025 \(107.175.91.48:22\) \[session: 8b95be6db92a\]
...
2019-09-26 23:09:54
212.129.52.3 attackbotsspam
Sep 26 17:07:11 ArkNodeAT sshd\[21542\]: Invalid user odroid from 212.129.52.3
Sep 26 17:07:11 ArkNodeAT sshd\[21542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.52.3
Sep 26 17:07:13 ArkNodeAT sshd\[21542\]: Failed password for invalid user odroid from 212.129.52.3 port 24212 ssh2
2019-09-26 23:37:12
106.52.28.217 attackspambots
Sep 26 14:00:21 master sshd[9731]: Failed password for invalid user vps from 106.52.28.217 port 41606 ssh2
2019-09-26 22:55:45

Recently Reported IPs

63.146.51.183 46.19.178.250 124.59.146.10 237.199.161.217
124.237.162.81 91.134.157.5 176.108.223.16 254.90.215.12
110.135.249.96 84.247.246.229 182.149.5.111 166.233.150.143
133.142.29.201 176.45.38.47 208.244.161.157 132.235.236.197
132.29.189.38 23.105.255.163 164.61.200.158 133.196.115.145