Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.158.243.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52238
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.158.243.129.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 18:35:31 CST 2025
;; MSG SIZE  rcvd: 108
Host info
129.243.158.213.in-addr.arpa domain name pointer c213-158-243-129.static.xdsl.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
129.243.158.213.in-addr.arpa	name = c213-158-243-129.static.xdsl.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
180.245.213.8 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-27 04:42:18
121.137.131.248 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-27 05:21:33
64.225.119.124 attackbotsspam
RDP Brute-Force (honeypot 5)
2020-02-27 05:22:21
113.161.212.1 attackspambots
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-02-27 05:18:27
185.53.88.125 attack
Fail2Ban Ban Triggered
2020-02-27 05:14:30
203.130.255.2 attackspambots
SSH Brute Force
2020-02-27 05:19:17
203.63.75.248 attack
Feb 26 16:15:02 ArkNodeAT sshd\[14303\]: Invalid user kigwasshoi from 203.63.75.248
Feb 26 16:15:02 ArkNodeAT sshd\[14303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.63.75.248
Feb 26 16:15:04 ArkNodeAT sshd\[14303\]: Failed password for invalid user kigwasshoi from 203.63.75.248 port 46226 ssh2
2020-02-27 04:43:10
196.52.43.85 attackspam
Honeypot hit.
2020-02-27 04:52:01
189.225.18.118 attack
Honeypot attack, port: 81, PTR: dsl-189-225-18-118-dyn.prod-infinitum.com.mx.
2020-02-27 05:01:57
211.57.89.183 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-27 04:52:58
157.230.23.229 attackspam
Attempt to hack Wordpress Login, XMLRPC or other login
2020-02-27 05:10:55
111.91.50.202 attack
Honeypot attack, port: 445, PTR: 202.snat-111-91-50.hns.net.in.
2020-02-27 04:52:41
184.176.166.10 attack
(imapd) Failed IMAP login from 184.176.166.10 (US/United States/-): 1 in the last 3600 secs
2020-02-27 05:08:24
112.85.42.176 attack
Feb 26 20:45:53 zeus sshd[26853]: Failed password for root from 112.85.42.176 port 34167 ssh2
Feb 26 20:45:58 zeus sshd[26853]: Failed password for root from 112.85.42.176 port 34167 ssh2
Feb 26 20:46:02 zeus sshd[26853]: Failed password for root from 112.85.42.176 port 34167 ssh2
Feb 26 20:46:07 zeus sshd[26853]: Failed password for root from 112.85.42.176 port 34167 ssh2
Feb 26 20:46:12 zeus sshd[26853]: Failed password for root from 112.85.42.176 port 34167 ssh2
2020-02-27 04:51:35
49.149.100.67 attackspam
1582724009 - 02/26/2020 14:33:29 Host: 49.149.100.67/49.149.100.67 Port: 445 TCP Blocked
2020-02-27 05:05:07

Recently Reported IPs

27.132.103.53 139.144.218.163 173.165.46.95 43.242.21.92
75.98.246.72 213.188.70.92 14.39.116.156 93.20.98.100
250.105.112.17 147.206.18.192 215.13.240.123 155.29.59.4
29.71.206.193 172.176.9.149 74.167.76.242 148.86.80.82
24.209.126.240 227.198.109.169 42.100.94.112 146.78.92.186