Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.254.129.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12054
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;198.254.129.139.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 17:55:52 CST 2025
;; MSG SIZE  rcvd: 108
Host info
139.129.254.198.in-addr.arpa domain name pointer ip-198-254-129-139.xplore.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.129.254.198.in-addr.arpa	name = ip-198-254-129-139.xplore.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
110.143.104.38 attackspambots
20 attempts against mh-ssh on acorn
2020-07-09 16:57:19
62.4.29.72 attack
2020-07-09T06:53:43.327854abusebot-2.cloudsearch.cf sshd[7623]: Invalid user Pal from 62.4.29.72 port 33944
2020-07-09T06:53:43.333346abusebot-2.cloudsearch.cf sshd[7623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.4.29.72
2020-07-09T06:53:43.327854abusebot-2.cloudsearch.cf sshd[7623]: Invalid user Pal from 62.4.29.72 port 33944
2020-07-09T06:53:45.629912abusebot-2.cloudsearch.cf sshd[7623]: Failed password for invalid user Pal from 62.4.29.72 port 33944 ssh2
2020-07-09T06:56:48.289715abusebot-2.cloudsearch.cf sshd[7715]: Invalid user ckl from 62.4.29.72 port 40528
2020-07-09T06:56:48.302170abusebot-2.cloudsearch.cf sshd[7715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.4.29.72
2020-07-09T06:56:48.289715abusebot-2.cloudsearch.cf sshd[7715]: Invalid user ckl from 62.4.29.72 port 40528
2020-07-09T06:56:50.663790abusebot-2.cloudsearch.cf sshd[7715]: Failed password for invalid user ckl from 62.
...
2020-07-09 16:59:14
106.54.227.32 attackbots
20 attempts against mh-ssh on hail
2020-07-09 17:07:34
61.177.172.41 attackbotsspam
Brute-force attempt banned
2020-07-09 17:08:55
82.255.38.238 attackspam
Automatic report - Banned IP Access
2020-07-09 16:54:04
114.141.189.194 attack
Dovecot Invalid User Login Attempt.
2020-07-09 16:35:19
185.64.25.119 attackspambots
$f2bV_matches
2020-07-09 16:32:46
176.37.60.16 attackspam
Jul  9 08:07:06 XXX sshd[19057]: Invalid user zookeeper from 176.37.60.16 port 40418
2020-07-09 17:08:32
108.52.18.169 attackspam
CMS (WordPress or Joomla) login attempt.
2020-07-09 16:28:47
165.22.122.104 attackbots
$f2bV_matches
2020-07-09 16:30:41
201.33.207.247 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-07-09 16:35:54
5.200.143.71 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-07-09 16:45:53
113.89.191.195 attackbots
Unauthorised access (Jul  9) SRC=113.89.191.195 LEN=52 TTL=116 ID=21735 DF TCP DPT=445 WINDOW=8192 SYN
2020-07-09 16:31:11
141.98.9.161 attackbots
Jul  9 10:19:14 debian64 sshd[6728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.161 
Jul  9 10:19:16 debian64 sshd[6728]: Failed password for invalid user admin from 141.98.9.161 port 46045 ssh2
...
2020-07-09 16:46:35
60.167.182.218 attackspambots
Jul  9 06:41:01 sigma sshd\[7861\]: Invalid user jinhaoxuan from 60.167.182.218Jul  9 06:41:03 sigma sshd\[7861\]: Failed password for invalid user jinhaoxuan from 60.167.182.218 port 35786 ssh2
...
2020-07-09 17:08:13

Recently Reported IPs

134.110.242.95 60.56.244.188 6.12.57.12 148.99.125.73
185.76.104.239 114.142.93.13 68.22.128.111 18.103.124.92
163.238.200.142 155.3.76.119 222.29.11.111 16.110.196.117
73.19.62.18 87.234.117.144 34.181.44.204 248.134.40.246
131.50.121.233 127.215.205.216 130.0.215.160 107.164.14.34