Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Bangladesh

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.122.29.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2753
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.122.29.138.			IN	A

;; AUTHORITY SECTION:
.			416	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 05:56:20 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 138.29.122.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.29.122.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
186.31.65.66 attackspambots
Aug 14 00:48:24 aat-srv002 sshd[8130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.31.65.66
Aug 14 00:48:26 aat-srv002 sshd[8130]: Failed password for invalid user eaf from 186.31.65.66 port 49099 ssh2
Aug 14 00:53:34 aat-srv002 sshd[8235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.31.65.66
Aug 14 00:53:36 aat-srv002 sshd[8235]: Failed password for invalid user wkiconsole from 186.31.65.66 port 58516 ssh2
...
2019-08-14 17:27:06
46.229.168.146 attackspam
Malicious Traffic/Form Submission
2019-08-14 17:34:09
96.23.98.149 attackbotsspam
Aug 14 07:22:36 db sshd\[10314\]: Invalid user cf from 96.23.98.149
Aug 14 07:22:36 db sshd\[10314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=modemcable149.98-23-96.mc.videotron.ca 
Aug 14 07:22:38 db sshd\[10314\]: Failed password for invalid user cf from 96.23.98.149 port 46130 ssh2
Aug 14 07:30:17 db sshd\[10431\]: Invalid user flatron from 96.23.98.149
Aug 14 07:30:17 db sshd\[10431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=modemcable149.98-23-96.mc.videotron.ca 
...
2019-08-14 16:46:58
80.82.77.193 attackspambots
[portscan] udp/137 [netbios NS]
*(RWIN=-)(08141159)
2019-08-14 17:35:25
77.232.128.87 attack
Aug 14 11:02:31 mail sshd\[323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.232.128.87  user=root
Aug 14 11:02:32 mail sshd\[323\]: Failed password for root from 77.232.128.87 port 47207 ssh2
Aug 14 11:07:31 mail sshd\[995\]: Invalid user mcm from 77.232.128.87 port 42991
Aug 14 11:07:31 mail sshd\[995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.232.128.87
Aug 14 11:07:32 mail sshd\[995\]: Failed password for invalid user mcm from 77.232.128.87 port 42991 ssh2
2019-08-14 17:28:04
180.126.232.189 attackspam
Automatic report - Port Scan Attack
2019-08-14 16:51:29
105.72.172.5 attackbots
2019-08-14T06:39:38.489588abusebot-6.cloudsearch.cf sshd\[21681\]: Invalid user mine from 105.72.172.5 port 34158
2019-08-14 17:00:43
141.98.9.42 attack
Aug 14 10:41:53 relay postfix/smtpd\[22735\]: warning: unknown\[141.98.9.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 14 10:42:26 relay postfix/smtpd\[11830\]: warning: unknown\[141.98.9.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 14 10:43:20 relay postfix/smtpd\[22736\]: warning: unknown\[141.98.9.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 14 10:43:55 relay postfix/smtpd\[15596\]: warning: unknown\[141.98.9.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 14 10:44:48 relay postfix/smtpd\[25075\]: warning: unknown\[141.98.9.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-08-14 16:53:01
185.208.208.144 attackspambots
Multiport scan : 8 ports scanned 1018 3333 3388 3394 3395 8888 8956 33892
2019-08-14 17:00:22
200.149.231.50 attack
Aug 14 07:48:16 debian sshd\[19096\]: Invalid user larsson from 200.149.231.50 port 43608
Aug 14 07:48:16 debian sshd\[19096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.149.231.50
...
2019-08-14 17:15:04
181.67.207.171 attack
Automatic report - Port Scan Attack
2019-08-14 17:11:59
222.186.42.117 attackbotsspam
Aug 14 08:56:03 game-panel sshd[19273]: Failed password for root from 222.186.42.117 port 55586 ssh2
Aug 14 08:56:12 game-panel sshd[19292]: Failed password for root from 222.186.42.117 port 49440 ssh2
Aug 14 08:56:15 game-panel sshd[19292]: Failed password for root from 222.186.42.117 port 49440 ssh2
2019-08-14 17:01:25
89.248.168.51 attackbotsspam
2087/tcp 1935/tcp 1900/tcp...
[2019-06-13/08-14]127pkt,14pt.(tcp)
2019-08-14 17:00:00
175.124.43.123 attackspambots
$f2bV_matches
2019-08-14 16:50:42
62.43.51.144 attack
Automatic report - Port Scan Attack
2019-08-14 17:16:24

Recently Reported IPs

190.129.90.115 46.164.236.240 183.82.126.176 60.219.134.115
138.197.184.178 05.149.219.201 107.161.18.152 46.0.184.13
104.168.126.41 190.219.223.71 61.58.89.44 89.253.188.101
112.187.249.34 154.194.2.238 49.234.78.184 168.228.5.101
96.82.156.54 187.211.12.114 59.89.216.211 42.200.72.189