Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Fairfield

Region: Connecticut

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.148.129.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23716
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;3.148.129.132.			IN	A

;; AUTHORITY SECTION:
.			3238	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090402 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Sep 05 12:18:58 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 132.129.148.3.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 132.129.148.3.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
61.79.242.34 attackspambots
Unauthorized connection attempt detected from IP address 61.79.242.34 to port 4567 [J]
2020-01-12 22:50:11
156.220.51.86 attackbotsspam
Unauthorized connection attempt detected from IP address 156.220.51.86 to port 23 [J]
2020-01-12 23:01:01
196.203.72.11 attackspambots
Unauthorized connection attempt detected from IP address 196.203.72.11 to port 23 [J]
2020-01-12 22:31:26
211.91.56.24 attackspam
Unauthorized connection attempt detected from IP address 211.91.56.24 to port 81 [J]
2020-01-12 22:54:44
60.161.0.17 attack
Unauthorized connection attempt detected from IP address 60.161.0.17 to port 22 [J]
2020-01-12 22:50:30
189.106.238.35 attackspam
Unauthorized connection attempt detected from IP address 189.106.238.35 to port 8080 [J]
2020-01-12 22:32:25
123.31.32.150 attackbotsspam
SSHScan
2020-01-12 22:39:04
83.250.17.205 attackbots
Unauthorized connection attempt detected from IP address 83.250.17.205 to port 5555 [J]
2020-01-12 22:46:50
110.14.58.84 attackbots
Unauthorized connection attempt detected from IP address 110.14.58.84 to port 23 [J]
2020-01-12 22:41:25
188.94.32.46 attackbotsspam
Unauthorized connection attempt detected from IP address 188.94.32.46 to port 8080 [J]
2020-01-12 22:34:41
50.239.163.172 attackbots
Jan 12 15:09:30 s1 sshd\[19854\]: Invalid user stephen from 50.239.163.172 port 55684
Jan 12 15:09:30 s1 sshd\[19854\]: Failed password for invalid user stephen from 50.239.163.172 port 55684 ssh2
Jan 12 15:12:00 s1 sshd\[20819\]: Invalid user seafile from 50.239.163.172 port 48280
Jan 12 15:12:00 s1 sshd\[20819\]: Failed password for invalid user seafile from 50.239.163.172 port 48280 ssh2
Jan 12 15:14:29 s1 sshd\[20913\]: Invalid user admin from 50.239.163.172 port 40872
Jan 12 15:14:29 s1 sshd\[20913\]: Failed password for invalid user admin from 50.239.163.172 port 40872 ssh2
...
2020-01-12 22:50:44
110.52.215.80 attack
Unauthorized connection attempt detected from IP address 110.52.215.80 to port 2220 [J]
2020-01-12 23:08:41
109.111.233.106 attack
Unauthorized connection attempt detected from IP address 109.111.233.106 to port 23 [J]
2020-01-12 23:08:56
190.213.101.235 attackbotsspam
Unauthorized connection attempt detected from IP address 190.213.101.235 to port 8080 [J]
2020-01-12 22:55:41
88.129.67.38 attackbots
Unauthorized connection attempt detected from IP address 88.129.67.38 to port 23 [J]
2020-01-12 23:13:55

Recently Reported IPs

159.229.105.207 92.57.35.56 3.247.101.161 196.49.249.252
165.227.92.60 78.200.188.186 187.176.190.225 217.22.170.3
3.1.124.239 204.59.58.203 18.84.54.16 189.186.139.189
130.150.204.98 43.101.229.94 192.227.252.30 60.223.255.14
206.189.95.16 110.159.136.106 113.85.41.64 14.164.224.95