Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.237.29.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52848
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.237.29.242.			IN	A

;; AUTHORITY SECTION:
.			595	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 15:28:39 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 242.29.237.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.29.237.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.68.110.157 attackbots
2019-07-04 07:15:01 H=([118.68.110.157]) [118.68.110.157]:37526 I=[10.100.18.21]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=118.68.110.157)
2019-07-04 07:15:02 unexpected disconnection while reading SMTP command from ([118.68.110.157]) [118.68.110.157]:37526 I=[10.100.18.21]:25 (error: Connection reset by peer)
2019-07-04 08:03:13 H=([118.68.110.157]) [118.68.110.157]:25650 I=[10.100.18.21]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=118.68.110.157)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=118.68.110.157
2019-07-04 17:43:03
201.48.16.97 attackspambots
spamassassin . MISSING_HEADERS[1.2] . SPF_SOFTFAIL[1.0] . HELO_NO_DOMAIN[2.2] . REPLYTO_WITHOUT_TO_CC[1.9] . FREEMAIL_FORGED_REPLYTO[2.5] . FROM_MISSP_REPLYTO[0.3] . TO_NO_BRKTS_FROM_MSSP[1.2] . FROM_MISSP_EH_MATCH[0.3] . TO_NO_BRKTS_MSFT[2.5] . FORGED_MUA_OUTLOOK[2.8] _ _ (386)
2019-07-04 18:22:22
67.231.242.50 attackspam
Spam Timestamp : 04-Jul-19 06:10 _ BlockList Provider  combined abuse _ (409)
2019-07-04 17:38:59
221.239.42.244 attackspambots
f2b trigger Multiple SASL failures
2019-07-04 18:20:40
113.140.84.86 attackbots
IMAP brute force
...
2019-07-04 18:03:28
133.242.171.132 attackspam
TCP src-port=33150   dst-port=25    dnsbl-sorbs abuseat-org barracuda       (Project Honey Pot rated Suspicious)   (388)
2019-07-04 18:15:20
185.231.245.17 attackbots
Jul  4 05:02:06 aat-srv002 sshd[5236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.231.245.17
Jul  4 05:02:08 aat-srv002 sshd[5236]: Failed password for invalid user fo from 185.231.245.17 port 35598 ssh2
Jul  4 05:05:30 aat-srv002 sshd[5299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.231.245.17
Jul  4 05:05:32 aat-srv002 sshd[5299]: Failed password for invalid user hurtworld from 185.231.245.17 port 60572 ssh2
...
2019-07-04 18:09:55
49.150.24.46 attack
445/tcp
[2019-07-04]1pkt
2019-07-04 18:23:10
68.57.86.37 attackspam
Jul  4 05:06:17 aat-srv002 sshd[5319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.57.86.37
Jul  4 05:06:19 aat-srv002 sshd[5319]: Failed password for invalid user mysql from 68.57.86.37 port 50810 ssh2
Jul  4 05:12:16 aat-srv002 sshd[5394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.57.86.37
Jul  4 05:12:18 aat-srv002 sshd[5394]: Failed password for invalid user chevalier from 68.57.86.37 port 42050 ssh2
...
2019-07-04 18:17:07
223.97.204.5 attackspambots
23/tcp
[2019-07-04]1pkt
2019-07-04 18:28:42
182.254.227.147 attackspambots
Jul  4 09:27:52 MK-Soft-VM5 sshd\[15646\]: Invalid user toyota from 182.254.227.147 port 38892
Jul  4 09:27:52 MK-Soft-VM5 sshd\[15646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.227.147
Jul  4 09:27:54 MK-Soft-VM5 sshd\[15646\]: Failed password for invalid user toyota from 182.254.227.147 port 38892 ssh2
...
2019-07-04 18:24:02
111.21.193.23 attack
23/tcp
[2019-07-04]1pkt
2019-07-04 18:36:04
67.218.96.156 attack
Jul  4 08:11:57 giegler sshd[13957]: Invalid user sw from 67.218.96.156 port 53356
2019-07-04 17:51:28
115.58.128.44 attack
2222/tcp
[2019-07-04]1pkt
2019-07-04 18:18:05
167.99.66.219 attackbotsspam
TCP src-port=51452   dst-port=25    dnsbl-sorbs abuseat-org barracuda         (391)
2019-07-04 18:07:58

Recently Reported IPs

114.237.29.216 114.237.29.239 114.237.29.204 114.237.29.244
114.237.29.254 114.237.29.34 114.237.29.31 114.237.29.36
113.53.211.7 114.237.29.32 114.237.29.39 114.237.29.41
114.237.29.50 114.237.29.44 114.237.29.57 114.237.29.48
114.237.29.67 114.237.29.75 114.237.29.87 114.237.29.9