Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Groningen

Region: Groningen

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.141.129.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55300
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.141.129.116.			IN	A

;; AUTHORITY SECTION:
.			530	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024091601 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 17 04:47:06 CST 2024
;; MSG SIZE  rcvd: 107
Host info
116.129.141.34.in-addr.arpa domain name pointer 116.129.141.34.bc.googleusercontent.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
116.129.141.34.in-addr.arpa	name = 116.129.141.34.bc.googleusercontent.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
88.247.164.101 attackspambots
firewall-block, port(s): 81/tcp
2020-02-14 07:45:44
185.153.199.133 attack
RDP Bruteforce
2020-02-14 07:48:50
192.241.234.17 attack
" "
2020-02-14 08:06:24
77.13.126.248 attackspambots
Feb 13 22:10:01 server sshd\[9518\]: Invalid user pi from 77.13.126.248
Feb 13 22:10:01 server sshd\[9518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=x4d0d7ef8.dyn.telefonica.de 
Feb 13 22:10:01 server sshd\[9520\]: Invalid user pi from 77.13.126.248
Feb 13 22:10:01 server sshd\[9520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=x4d0d7ef8.dyn.telefonica.de 
Feb 13 22:10:02 server sshd\[9518\]: Failed password for invalid user pi from 77.13.126.248 port 49108 ssh2
...
2020-02-14 07:53:28
61.244.74.20 attack
1581621001 - 02/13/2020 20:10:01 Host: 61.244.74.20/61.244.74.20 Port: 445 TCP Blocked
2020-02-14 07:54:38
178.21.201.95 attackbotsspam
Email rejected due to spam filtering
2020-02-14 07:47:35
111.229.78.120 attackbotsspam
Feb 13 11:29:15 mockhub sshd[31959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.78.120
Feb 13 11:29:17 mockhub sshd[31959]: Failed password for invalid user ftpuser from 111.229.78.120 port 52868 ssh2
...
2020-02-14 07:49:39
2.176.120.116 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 08:14:37
84.204.6.78 attack
firewall-block, port(s): 9530/tcp
2020-02-14 07:48:18
124.235.206.130 attackbots
SSH-BruteForce
2020-02-14 07:56:24
114.67.228.184 attackspambots
Feb 14 00:25:35 mout sshd[9659]: Invalid user Montreal from 114.67.228.184 port 48324
2020-02-14 08:15:05
34.80.120.87 attackspam
Feb 14 00:44:31 vpn01 sshd[20037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.120.87
Feb 14 00:44:33 vpn01 sshd[20037]: Failed password for invalid user csgoserver from 34.80.120.87 port 42946 ssh2
...
2020-02-14 08:00:59
125.59.204.131 attackspambots
port scan and connect, tcp 23 (telnet)
2020-02-14 08:12:16
95.160.162.110 attackspam
port scan and connect, tcp 23 (telnet)
2020-02-14 08:15:39
2.238.32.42 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 07:44:45

Recently Reported IPs

55.226.23.127 38.22.236.62 0.95.128.157 248.61.66.63
234.93.8.68 132.246.31.231 165.162.184.144 64.164.29.215
23.225.255.133 58.24.85.189 123.121.76.254 43.87.192.251
39.240.204.146 134.225.37.194 144.253.171.189 123.121.55.45
206.185.119.31 191.235.85.58 36.47.166.99 16.98.191.50