Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.182.130.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19577
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.182.130.129.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013101 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 02:38:04 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 129.130.182.99.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 129.130.182.99.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
196.52.43.60 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-10 18:21:04
37.49.224.67 attack
10.07.2019 08:56:23 Connection to port 81 blocked by firewall
2019-07-10 18:25:10
177.72.131.229 attackspam
$f2bV_matches
2019-07-10 18:04:30
134.175.62.14 attackbots
Jul 10 11:30:05 ns341937 sshd[15807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.62.14
Jul 10 11:30:08 ns341937 sshd[15807]: Failed password for invalid user baby from 134.175.62.14 port 34584 ssh2
Jul 10 11:39:31 ns341937 sshd[17492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.62.14
...
2019-07-10 17:48:21
67.164.228.251 attackbotsspam
Automatic report - Web App Attack
2019-07-10 17:56:29
185.220.102.6 attack
Triggered by Fail2Ban at Ares web server
2019-07-10 18:22:53
118.24.84.203 attackbots
Jul 10 10:13:29 localhost sshd\[40416\]: Invalid user pemp from 118.24.84.203 port 44633
Jul 10 10:13:29 localhost sshd\[40416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.84.203
...
2019-07-10 18:26:55
210.212.194.36 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-10 08:48:18,759 INFO [amun_request_handler] PortScan Detected on Port: 445 (210.212.194.36)
2019-07-10 18:24:49
120.60.13.85 attackbotsspam
$f2bV_matches
2019-07-10 18:17:38
185.80.0.95 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-10 17:54:15
160.153.146.68 attackspam
[Wordpress bruteforce]
failed pass=[jetsam?]
2019-07-10 18:38:29
176.109.247.91 attackbotsspam
" "
2019-07-10 18:32:27
179.42.201.18 attackspam
Autoban   179.42.201.18 ABORTED AUTH
2019-07-10 18:14:54
198.108.67.104 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-10 18:26:35
104.18.48.6 attackspam
web spam and scam
2019-07-10 18:30:37

Recently Reported IPs

68.133.139.135 63.161.193.62 195.189.243.237 210.241.70.196
206.220.220.10 96.67.13.27 85.102.203.113 83.49.144.164
240.28.242.154 255.29.21.173 166.14.9.151 238.198.182.163
97.219.73.57 157.57.116.127 45.177.25.120 248.190.163.146
201.130.79.194 46.96.16.169 127.21.45.52 211.40.206.196