Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.158.243.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52238
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.158.243.129.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 18:35:31 CST 2025
;; MSG SIZE  rcvd: 108
Host info
129.243.158.213.in-addr.arpa domain name pointer c213-158-243-129.static.xdsl.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
129.243.158.213.in-addr.arpa	name = c213-158-243-129.static.xdsl.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
86.61.66.59 attackspam
SSH login attempts.
2020-10-09 16:32:05
178.128.247.181 attackbotsspam
(sshd) Failed SSH login from 178.128.247.181 (NL/Netherlands/-): 5 in the last 3600 secs
2020-10-09 16:50:58
23.99.130.19 attackbotsspam
Automatic report - XMLRPC Attack
2020-10-09 16:44:06
14.182.14.63 attackbotsspam
Unauthorized connection attempt from IP address 14.182.14.63 on Port 445(SMB)
2020-10-09 16:08:36
159.203.241.101 attack
159.203.241.101 - - [09/Oct/2020:05:57:46 +0100] "POST /wp-login.php HTTP/1.1" 403 221 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.203.241.101 - - [09/Oct/2020:05:57:47 +0100] "POST /wp-login.php HTTP/1.1" 403 221 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.203.241.101 - - [09/Oct/2020:05:57:47 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-09 16:39:40
200.169.6.206 attackspam
Oct  9 04:28:45 ns41 sshd[13696]: Failed password for root from 200.169.6.206 port 53270 ssh2
Oct  9 04:28:45 ns41 sshd[13696]: Failed password for root from 200.169.6.206 port 53270 ssh2
2020-10-09 16:09:04
141.98.9.31 attackspambots
This client attempted to login to an administrator account on a Website, or abused from another resource.
2020-10-09 16:31:10
64.20.51.155 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-10-09 16:34:40
124.238.113.126 attackspambots
2020-10-09T05:50:52.201455snf-827550 sshd[28175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.238.113.126
2020-10-09T05:50:52.184902snf-827550 sshd[28175]: Invalid user jj from 124.238.113.126 port 59848
2020-10-09T05:50:54.284372snf-827550 sshd[28175]: Failed password for invalid user jj from 124.238.113.126 port 59848 ssh2
...
2020-10-09 16:47:04
212.253.94.254 attackbotsspam
Port scan denied
2020-10-09 16:20:01
104.224.183.154 attack
Oct  9 08:06:15 plex-server sshd[2574041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.224.183.154 
Oct  9 08:06:15 plex-server sshd[2574041]: Invalid user nginx from 104.224.183.154 port 50376
Oct  9 08:06:16 plex-server sshd[2574041]: Failed password for invalid user nginx from 104.224.183.154 port 50376 ssh2
Oct  9 08:10:59 plex-server sshd[2576071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.224.183.154  user=root
Oct  9 08:11:01 plex-server sshd[2576071]: Failed password for root from 104.224.183.154 port 41472 ssh2
...
2020-10-09 16:48:02
122.54.221.166 attackbotsspam
Unauthorized connection attempt from IP address 122.54.221.166 on Port 445(SMB)
2020-10-09 16:12:57
79.170.185.190 attack
uvcm 79.170.185.190 [09/Oct/2020:03:40:15 "-" "GET /wp-login.php?redirect_to=https://www.rumah-desain-interior.com/blog/ 200 5710
79.170.185.190 [09/Oct/2020:03:40:48 "-" "GET /wp-login.php?redirect_to=https://www.rumah-desain-interior.com/blog/ 200 1850
79.170.185.190 [09/Oct/2020:03:40:50 "-" "GET /wp-login.php 200 1852
2020-10-09 16:36:36
141.98.9.36 attackspam
Oct  9 09:39:20 server1 sshd[20381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.36
Oct  9 09:39:22 server1 sshd[20381]: Failed password for invalid user admin from 141.98.9.36 port 43905 ssh2
Oct  9 09:39:56 server1 sshd[20413]: Invalid user admin from 141.98.9.36 port 38403
...
2020-10-09 16:42:42
175.6.0.190 attack
Port scan: Attack repeated for 24 hours
2020-10-09 16:45:31

Recently Reported IPs

27.132.103.53 139.144.218.163 173.165.46.95 43.242.21.92
75.98.246.72 213.188.70.92 14.39.116.156 93.20.98.100
250.105.112.17 147.206.18.192 215.13.240.123 155.29.59.4
29.71.206.193 172.176.9.149 74.167.76.242 148.86.80.82
24.209.126.240 227.198.109.169 42.100.94.112 146.78.92.186