Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: New Zealand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.173.129.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34633
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;203.173.129.164.		IN	A

;; AUTHORITY SECTION:
.			189	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 16:35:23 CST 2022
;; MSG SIZE  rcvd: 108
Host info
164.129.173.203.in-addr.arpa domain name pointer 203-173-129-164.dsl.dyn.ihug.co.nz.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.129.173.203.in-addr.arpa	name = 203-173-129-164.dsl.dyn.ihug.co.nz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
195.206.105.217 attackspam
Aug 14 16:35:40 localhost sshd\[1154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.206.105.217  user=root
Aug 14 16:35:42 localhost sshd\[1154\]: Failed password for root from 195.206.105.217 port 39634 ssh2
Aug 14 16:35:45 localhost sshd\[1154\]: Failed password for root from 195.206.105.217 port 39634 ssh2
Aug 14 16:35:47 localhost sshd\[1154\]: Failed password for root from 195.206.105.217 port 39634 ssh2
Aug 14 16:35:50 localhost sshd\[1154\]: Failed password for root from 195.206.105.217 port 39634 ssh2
...
2020-08-14 23:03:02
182.75.107.70 attackspambots
2020-08-14 22:22:11
142.93.184.142 attack
2020-08-14 22:43:52
138.197.11.148 attack
2020-08-14 22:47:18
184.75.211.141 attack
2020-08-14 22:20:38
123.30.149.92 attack
Aug 14 19:19:44 itv-usvr-01 sshd[28818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.149.92  user=root
Aug 14 19:19:45 itv-usvr-01 sshd[28818]: Failed password for root from 123.30.149.92 port 54898 ssh2
Aug 14 19:22:51 itv-usvr-01 sshd[28945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.149.92  user=root
Aug 14 19:22:53 itv-usvr-01 sshd[28945]: Failed password for root from 123.30.149.92 port 41873 ssh2
Aug 14 19:25:54 itv-usvr-01 sshd[29051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.149.92  user=root
Aug 14 19:25:56 itv-usvr-01 sshd[29051]: Failed password for root from 123.30.149.92 port 28848 ssh2
2020-08-14 22:45:17
142.93.187.214 attackspam
2020-08-14 22:43:26
122.55.223.18 attackbots
Port Scan
...
2020-08-14 22:37:10
165.227.98.99 attackbots
2020-08-14 22:34:26
159.65.175.177 attack
2020-08-14 22:40:19
142.93.176.207 attackspambots
2020-08-14 22:46:24
104.245.145.24 attack
2020-08-14 22:58:07
162.219.176.251 attackbots
2020-08-14 22:35:40
159.65.45.211 attackbots
2020-08-14 22:40:51
165.227.210.10 attack
2020-08-14 22:33:39

Recently Reported IPs

104.20.124.15 104.20.124.27 104.20.125.15 104.20.125.27
104.20.126.24 104.20.126.88 104.20.127.117 104.20.127.24
104.20.127.88 104.20.128.117 104.20.128.21 104.20.129.108
104.20.129.21 223.180.198.13 104.20.13.26 104.20.13.29
66.188.204.73 104.20.13.71 16.118.239.119 104.20.130.108