Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: Tencent Cloud Computing (Beijing) Co. Ltd.

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbotsspam
SSH/22 MH Probe, BF, Hack -
2019-08-15 12:17:02
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.29.172.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63862
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;119.29.172.20.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081401 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 15 12:16:56 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 20.172.29.119.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 20.172.29.119.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
101.254.183.205 attackspam
Mar 28 08:43:46 host sshd[60619]: Invalid user yox from 101.254.183.205 port 45810
...
2020-03-28 16:05:57
92.252.160.19 attackspambots
1585367420 - 03/28/2020 04:50:20 Host: 92.252.160.19/92.252.160.19 Port: 445 TCP Blocked
2020-03-28 15:49:49
208.71.161.133 attackbots
firewall-block, port(s): 23/tcp
2020-03-28 15:56:11
198.108.66.234 attack
firewall-block, port(s): 21313/tcp
2020-03-28 15:41:38
106.54.97.55 attackspambots
Mar 28 07:44:22 hosting180 sshd[25682]: Invalid user test from 106.54.97.55 port 43004
...
2020-03-28 15:45:37
121.162.60.159 attackspam
$f2bV_matches
2020-03-28 16:01:00
94.23.63.213 attackbots
Mar 28 03:34:18 plusreed sshd[8133]: Invalid user black from 94.23.63.213
...
2020-03-28 15:37:32
59.126.242.29 attackbots
TW_MAINT-TW-TWNIC_<177>1585377352 [1:2403382:56282] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 42 [Classification: Misc Attack] [Priority: 2]:  {TCP} 59.126.242.29:12790
2020-03-28 16:03:52
185.243.114.132 attackbots
Attempting to bruteforce  account on exchange server.
2020-03-28 15:55:14
5.252.177.213 attackbots
Chat Spam
2020-03-28 15:42:49
167.172.207.139 attackbots
(sshd) Failed SSH login from 167.172.207.139 (US/United States/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 28 05:59:05 ubnt-55d23 sshd[3575]: Invalid user kss from 167.172.207.139 port 34838
Mar 28 05:59:07 ubnt-55d23 sshd[3575]: Failed password for invalid user kss from 167.172.207.139 port 34838 ssh2
2020-03-28 15:39:23
106.54.13.244 attack
Invalid user vismara from 106.54.13.244 port 54050
2020-03-28 15:24:28
47.22.82.8 attack
Fail2Ban Ban Triggered (2)
2020-03-28 15:40:48
210.227.113.18 attack
$f2bV_matches
2020-03-28 15:52:39
110.138.151.111 attackspambots
" "
2020-03-28 15:23:58

Recently Reported IPs

145.36.194.177 47.20.244.247 64.91.158.11 28.215.112.32
129.41.219.168 131.110.183.75 31.124.32.98 116.58.239.110
12.86.1.51 83.197.212.30 3.227.126.157 60.171.203.161
194.28.37.216 171.215.0.100 122.136.62.123 36.24.149.6
132.232.37.238 94.102.49.237 180.167.82.126 35.156.62.49