Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.42.217.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56943
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.42.217.129.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 20:51:35 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 129.217.42.245.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 129.217.42.245.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.22.140.70 attackspam
Fail2Ban Ban Triggered
2020-06-16 01:27:27
45.137.190.213 attackspambots
Jun 15 19:07:37 localhost sshd\[6451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.137.190.213  user=root
Jun 15 19:07:39 localhost sshd\[6451\]: Failed password for root from 45.137.190.213 port 59728 ssh2
Jun 15 19:13:26 localhost sshd\[6713\]: Invalid user alex from 45.137.190.213
Jun 15 19:13:26 localhost sshd\[6713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.137.190.213
Jun 15 19:13:28 localhost sshd\[6713\]: Failed password for invalid user alex from 45.137.190.213 port 58572 ssh2
...
2020-06-16 01:28:47
23.97.180.45 attackspam
Jun 15 18:36:28 lnxmysql61 sshd[5273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.97.180.45
2020-06-16 01:34:11
37.187.16.30 attackbots
Jun 15 05:31:08 dignus sshd[11360]: Invalid user vishal from 37.187.16.30 port 56820
Jun 15 05:31:08 dignus sshd[11360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.16.30
Jun 15 05:31:10 dignus sshd[11360]: Failed password for invalid user vishal from 37.187.16.30 port 56820 ssh2
Jun 15 05:36:41 dignus sshd[11793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.16.30  user=root
Jun 15 05:36:43 dignus sshd[11793]: Failed password for root from 37.187.16.30 port 59276 ssh2
...
2020-06-16 01:38:24
209.107.196.165 attackbotsspam
Fail2Ban Ban Triggered
2020-06-16 01:17:38
177.69.237.54 attackspam
Jun 15 16:17:12 abendstille sshd\[11730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.237.54  user=root
Jun 15 16:17:14 abendstille sshd\[11730\]: Failed password for root from 177.69.237.54 port 52846 ssh2
Jun 15 16:22:15 abendstille sshd\[17160\]: Invalid user tina from 177.69.237.54
Jun 15 16:22:15 abendstille sshd\[17160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.237.54
Jun 15 16:22:17 abendstille sshd\[17160\]: Failed password for invalid user tina from 177.69.237.54 port 53730 ssh2
...
2020-06-16 01:30:36
119.90.61.10 attackbots
"fail2ban match"
2020-06-16 01:02:23
115.68.207.164 attack
Jun 15 11:57:40 ny01 sshd[23471]: Failed password for root from 115.68.207.164 port 59714 ssh2
Jun 15 12:05:17 ny01 sshd[24513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.68.207.164
Jun 15 12:05:19 ny01 sshd[24513]: Failed password for invalid user worker from 115.68.207.164 port 51070 ssh2
2020-06-16 01:17:09
182.139.86.139 attackspam
Jun 15 16:16:18 vps639187 sshd\[22792\]: Invalid user aurelien from 182.139.86.139 port 50766
Jun 15 16:16:18 vps639187 sshd\[22792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.139.86.139
Jun 15 16:16:20 vps639187 sshd\[22792\]: Failed password for invalid user aurelien from 182.139.86.139 port 50766 ssh2
...
2020-06-16 01:29:13
74.195.105.166 attackbots
pinterest spam
2020-06-16 01:04:22
222.186.173.154 attackspambots
Jun 15 19:07:01 ns381471 sshd[18190]: Failed password for root from 222.186.173.154 port 17910 ssh2
Jun 15 19:07:13 ns381471 sshd[18190]: error: maximum authentication attempts exceeded for root from 222.186.173.154 port 17910 ssh2 [preauth]
2020-06-16 01:10:51
101.91.176.67 attack
$f2bV_matches
2020-06-16 01:15:39
2.58.13.9 attackbots
Fail2Ban Ban Triggered
2020-06-16 01:25:54
216.213.29.140 attackspambots
Automatic report - Banned IP Access
2020-06-16 01:09:15
106.13.93.60 attackspam
Jun 15 18:36:48 pornomens sshd\[27431\]: Invalid user anil from 106.13.93.60 port 51416
Jun 15 18:36:48 pornomens sshd\[27431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.93.60
Jun 15 18:36:51 pornomens sshd\[27431\]: Failed password for invalid user anil from 106.13.93.60 port 51416 ssh2
...
2020-06-16 01:12:21

Recently Reported IPs

101.19.254.87 23.106.233.138 9.235.16.170 189.253.122.218
253.50.22.158 145.247.100.104 254.64.152.159 215.121.60.91
56.35.92.240 60.171.71.78 143.215.252.117 52.171.152.98
253.255.126.121 131.121.33.215 228.41.169.210 191.26.164.226
131.207.237.254 75.135.71.73 15.239.138.92 160.72.183.243