Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.129.91.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32402
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.129.91.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 10:22:40 CST 2025
;; MSG SIZE  rcvd: 106
Host info
145.91.129.40.in-addr.arpa domain name pointer h145.91.129.40.static.ip.windstream.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.91.129.40.in-addr.arpa	name = h145.91.129.40.static.ip.windstream.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
143.92.32.108 attack
[Fri Aug 14 09:50:02 2020] - Syn Flood From IP: 143.92.32.108 Port: 43228
2020-08-14 14:48:46
92.53.69.6 attackspam
2020-08-14T06:35:21.902174snf-827550 sshd[26535]: Failed password for root from 92.53.69.6 port 64510 ssh2
2020-08-14T06:39:35.292644snf-827550 sshd[26553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.53.69.6  user=root
2020-08-14T06:39:36.934759snf-827550 sshd[26553]: Failed password for root from 92.53.69.6 port 36312 ssh2
...
2020-08-14 14:35:50
162.62.19.79 attackbots
[Fri Aug 14 10:33:35 2020] - DDoS Attack From IP: 162.62.19.79 Port: 45117
2020-08-14 14:53:28
82.103.129.154 attack
probing for site backups
2020-08-14 14:44:25
51.158.98.224 attackbots
SSH Brute Force
2020-08-14 15:04:25
106.13.229.99 attack
Port Scan
...
2020-08-14 14:53:40
133.242.52.96 attack
(sshd) Failed SSH login from 133.242.52.96 (JP/Japan/-): 10 in the last 3600 secs
2020-08-14 14:28:55
139.213.98.106 attack
port 23
2020-08-14 14:31:43
119.249.145.227 attackspam
port 23
2020-08-14 14:59:24
218.92.0.219 attackspam
Aug 14 08:25:15 abendstille sshd\[10641\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.219  user=root
Aug 14 08:25:17 abendstille sshd\[10641\]: Failed password for root from 218.92.0.219 port 15488 ssh2
Aug 14 08:25:26 abendstille sshd\[10916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.219  user=root
Aug 14 08:25:28 abendstille sshd\[10916\]: Failed password for root from 218.92.0.219 port 16176 ssh2
Aug 14 08:25:30 abendstille sshd\[10916\]: Failed password for root from 218.92.0.219 port 16176 ssh2
...
2020-08-14 14:29:56
185.164.41.50 attack
Automatic report - Port Scan Attack
2020-08-14 14:46:40
46.105.227.206 attackbotsspam
Brute-force attempt banned
2020-08-14 14:36:09
93.42.6.147 attackspam
Automatic report - Banned IP Access
2020-08-14 14:46:10
59.124.90.112 attackbots
Port scan denied
2020-08-14 14:58:41
188.68.255.209 attackspam
SpamScore above: 10.0
2020-08-14 15:03:48

Recently Reported IPs

69.170.64.148 48.47.201.222 166.45.144.139 43.118.29.112
74.231.23.13 173.173.90.252 223.7.110.175 55.89.191.171
202.249.36.9 237.184.144.60 171.125.15.200 23.92.135.193
27.129.102.46 55.234.65.9 216.42.120.103 95.2.33.134
25.142.180.186 66.255.12.237 86.87.106.119 63.71.244.158