Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.202.29.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51331
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.202.29.94.			IN	A

;; AUTHORITY SECTION:
.			161	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 01:17:58 CST 2022
;; MSG SIZE  rcvd: 106
Host info
94.29.202.116.in-addr.arpa domain name pointer vps-cinephiliabeyond2.s4w.com.hr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
94.29.202.116.in-addr.arpa	name = vps-cinephiliabeyond2.s4w.com.hr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
208.100.26.233 attackbots
Automatic report - Banned IP Access
2019-07-23 05:06:34
198.245.72.70 attackbotsspam
(From cath@mail.kathreadwrites.net) Hello

I'm an SEO copywriter & wanted to share a quick ranking case study with you.

Google Loves the RIGHT WORDS in the RIGHT PLACE. I Got It Wrong.

I changed 8 words on a page...and you won't believe what happened.

So I wrote a case study about it.

Read it here: https://kathreadwrites.net/onpage-us/ ?
 
Put the WRONG WORDS in the WRONG PLACE

and you will not rank. PERIOD.

I hope this case study inspires you to check out your own on-page optimization.

Be Amazing

Cath

P.S. To get in touch, please use the contact form on my website instead of emailing me.

Unsubscribe
2019-07-23 04:41:19
209.97.153.35 attack
Automatic report - Banned IP Access
2019-07-23 05:07:40
58.82.233.242 attackbots
Scanning random ports - tries to find possible vulnerable services
2019-07-23 05:13:57
113.116.52.183 attackbotsspam
23/tcp
[2019-07-22]1pkt
2019-07-23 05:11:17
106.12.215.130 attack
ssh failed login
2019-07-23 04:55:46
84.191.215.70 attackbotsspam
Invalid user pi from 84.191.215.70 port 42284
Invalid user pi from 84.191.215.70 port 42288
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.191.215.70
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.191.215.70
Failed password for invalid user pi from 84.191.215.70 port 42284 ssh2
2019-07-23 04:39:51
189.205.46.250 attackbotsspam
Honeypot attack, port: 23, PTR: wimax-cpe-189-205-46-250.cdgen.static.axtel.net.
2019-07-23 04:54:48
5.196.72.58 attackspam
2019-07-22T20:11:58.612801abusebot-8.cloudsearch.cf sshd\[30561\]: Invalid user qhsupport from 5.196.72.58 port 37390
2019-07-23 04:40:54
80.11.44.112 attackbotsspam
Jul 22 15:39:52 dedicated sshd[7622]: Invalid user music from 80.11.44.112 port 50408
2019-07-23 05:02:19
190.17.120.88 attackbotsspam
[21/Jul/2019:08:14:46 -0400] "GET / HTTP/1.1" Chrome 51.0 UA
2019-07-23 05:03:46
118.165.99.154 attackbotsspam
Honeypot attack, port: 23, PTR: 118-165-99-154.dynamic-ip.hinet.net.
2019-07-23 05:07:09
197.227.99.126 attack
invalid user
2019-07-23 05:08:13
151.84.222.52 attackbotsspam
2019-07-22T20:28:50.243303abusebot-3.cloudsearch.cf sshd\[2720\]: Invalid user vaibhav from 151.84.222.52 port 19443
2019-07-23 04:38:46
212.47.243.74 attackbots
Bruteforce on SSH Honeypot
2019-07-23 05:15:58

Recently Reported IPs

116.202.29.234 116.202.3.13 116.202.3.52 116.202.31.70
116.202.36.201 116.202.36.28 116.202.44.81 116.202.45.1
116.202.49.142 116.202.5.115 116.202.51.60 116.202.56.165
116.202.6.9 116.202.63.5 116.202.66.236 116.202.71.235
116.202.71.92 116.202.72.188 116.202.77.37 116.202.77.63