Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
1.20.229.4 attack
1580878335 - 02/05/2020 05:52:15 Host: 1.20.229.4/1.20.229.4 Port: 445 TCP Blocked
2020-02-05 15:20:23
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.20.229.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38234
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.20.229.141.			IN	A

;; AUTHORITY SECTION:
.			180	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022400 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 24 20:53:17 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 141.229.20.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 141.229.20.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.61.43.223 attack
Dec  9 03:01:12 hosting sshd[14905]: Invalid user srihari from 182.61.43.223 port 47634
Dec  9 03:01:12 hosting sshd[14905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.43.223
Dec  9 03:01:12 hosting sshd[14905]: Invalid user srihari from 182.61.43.223 port 47634
Dec  9 03:01:14 hosting sshd[14905]: Failed password for invalid user srihari from 182.61.43.223 port 47634 ssh2
Dec  9 03:12:48 hosting sshd[16400]: Invalid user lt from 182.61.43.223 port 47948
...
2019-12-09 08:26:08
111.59.93.76 attackbots
Too many connections or unauthorized access detected from Arctic banned ip
2019-12-09 08:40:07
111.231.66.135 attackspambots
Dec  8 19:25:27 linuxvps sshd\[12785\]: Invalid user gentzler from 111.231.66.135
Dec  8 19:25:27 linuxvps sshd\[12785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.66.135
Dec  8 19:25:29 linuxvps sshd\[12785\]: Failed password for invalid user gentzler from 111.231.66.135 port 51162 ssh2
Dec  8 19:31:51 linuxvps sshd\[17276\]: Invalid user ident from 111.231.66.135
Dec  8 19:31:51 linuxvps sshd\[17276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.66.135
2019-12-09 08:49:00
104.168.145.77 attack
Dec  9 01:40:42 jane sshd[14508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.145.77 
Dec  9 01:40:44 jane sshd[14508]: Failed password for invalid user dtrmp4 from 104.168.145.77 port 46688 ssh2
...
2019-12-09 08:49:14
113.31.102.157 attack
2019-12-09T00:12:47.231337abusebot-4.cloudsearch.cf sshd\[28297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.31.102.157  user=root
2019-12-09 08:27:45
201.212.128.22 attackbotsspam
Dec  8 21:05:16 firewall sshd[32483]: Invalid user igor from 201.212.128.22
Dec  8 21:05:18 firewall sshd[32483]: Failed password for invalid user igor from 201.212.128.22 port 3617 ssh2
Dec  8 21:12:15 firewall sshd[32650]: Invalid user jahkarie from 201.212.128.22
...
2019-12-09 08:59:01
144.91.84.71 attackspam
Dec  8 19:06:48 TORMINT sshd\[24744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.91.84.71  user=news
Dec  8 19:06:49 TORMINT sshd\[24744\]: Failed password for news from 144.91.84.71 port 48460 ssh2
Dec  8 19:12:34 TORMINT sshd\[25220\]: Invalid user Nuutti from 144.91.84.71
Dec  8 19:12:34 TORMINT sshd\[25220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.91.84.71
...
2019-12-09 08:35:39
51.68.64.220 attackspam
Dec  9 01:07:03 v22018086721571380 sshd[6312]: Failed password for invalid user user from 51.68.64.220 port 34332 ssh2
2019-12-09 08:54:40
58.150.46.6 attackspam
fail2ban
2019-12-09 08:43:38
222.186.175.212 attackbotsspam
2019-12-09T01:12:42.525208centos sshd\[30613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212  user=root
2019-12-09T01:12:44.159923centos sshd\[30613\]: Failed password for root from 222.186.175.212 port 35640 ssh2
2019-12-09T01:12:47.562237centos sshd\[30613\]: Failed password for root from 222.186.175.212 port 35640 ssh2
2019-12-09 08:27:21
189.134.178.180 attack
Unauthorized connection attempt detected from IP address 189.134.178.180 to port 445
2019-12-09 08:59:30
159.65.189.115 attackbots
Dec  9 00:40:50 *** sshd[10771]: User root from 159.65.189.115 not allowed because not listed in AllowUsers
2019-12-09 08:42:52
130.180.66.98 attack
2019-12-09T01:04:37.774940  sshd[23858]: Invalid user ident from 130.180.66.98 port 57730
2019-12-09T01:04:37.789139  sshd[23858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.180.66.98
2019-12-09T01:04:37.774940  sshd[23858]: Invalid user ident from 130.180.66.98 port 57730
2019-12-09T01:04:39.509297  sshd[23858]: Failed password for invalid user ident from 130.180.66.98 port 57730 ssh2
2019-12-09T01:12:25.167726  sshd[23974]: Invalid user guest from 130.180.66.98 port 48344
...
2019-12-09 08:50:00
51.38.231.36 attackspambots
Dec  8 14:46:14 hpm sshd\[7406\]: Invalid user 12345qwerasd from 51.38.231.36
Dec  8 14:46:14 hpm sshd\[7406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.ip-51-38-231.eu
Dec  8 14:46:16 hpm sshd\[7406\]: Failed password for invalid user 12345qwerasd from 51.38.231.36 port 51734 ssh2
Dec  8 14:51:30 hpm sshd\[7847\]: Invalid user 1111111111 from 51.38.231.36
Dec  8 14:51:30 hpm sshd\[7847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.ip-51-38-231.eu
2019-12-09 09:02:32
167.114.152.139 attackspambots
Dec  8 19:54:37 ny01 sshd[25676]: Failed password for root from 167.114.152.139 port 53430 ssh2
Dec  8 19:59:51 ny01 sshd[26777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.152.139
Dec  8 19:59:53 ny01 sshd[26777]: Failed password for invalid user web from 167.114.152.139 port 33992 ssh2
2019-12-09 09:00:49

Recently Reported IPs

14.143.52.238 1.20.229.149 1.20.229.151 1.20.229.154
1.20.229.161 1.20.229.170 1.20.229.177 1.20.229.18
1.20.229.185 1.20.229.191 1.20.229.193 1.20.229.202
172.23.42.53 1.20.229.207 1.20.229.213 1.20.229.218
1.20.229.22 1.20.229.225 1.20.229.230 1.20.229.232