Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.29.42.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41815
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.29.42.120.			IN	A

;; AUTHORITY SECTION:
.			511	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 06:34:16 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 120.42.29.119.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 120.42.29.119.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
164.132.51.91 attackspam
Invalid user support from 164.132.51.91 port 56226
2020-01-15 04:35:23
70.45.133.188 attackbotsspam
Nov 24 05:19:33 odroid64 sshd\[14587\]: Invalid user duston from 70.45.133.188
Nov 24 05:19:33 odroid64 sshd\[14587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.45.133.188
...
2020-01-15 04:11:17
159.89.195.209 attack
Invalid user ubnt from 159.89.195.209 port 61927
2020-01-15 04:36:04
27.34.32.130 attackbotsspam
Invalid user admin from 27.34.32.130 port 37050
2020-01-15 04:18:27
162.247.74.7 attackspam
Invalid user openelec from 162.247.74.7 port 58688
2020-01-15 04:35:49
192.42.116.18 attackspam
Invalid user admin from 192.42.116.18 port 51882
2020-01-15 04:27:52
198.251.89.80 attackbotsspam
Jan 14 18:27:45 server sshd\[9884\]: Invalid user pi from 198.251.89.80
Jan 14 18:27:45 server sshd\[9884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor-exit-01.nonanet.net 
Jan 14 18:27:47 server sshd\[9884\]: Failed password for invalid user pi from 198.251.89.80 port 48102 ssh2
Jan 14 18:32:31 server sshd\[11057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor-exit-01.nonanet.net  user=root
Jan 14 18:32:33 server sshd\[11057\]: Failed password for root from 198.251.89.80 port 37046 ssh2
...
2020-01-15 04:24:38
185.117.215.9 attack
Time:     Tue Jan 14 15:02:11 2020 -0300
IP:       185.117.215.9 (DE/Germany/tor3.digineo.de)
Failures: 5 (mod_security)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-01-15 04:29:26
2.139.209.78 attackbotsspam
Unauthorized connection attempt detected from IP address 2.139.209.78 to port 2220 [J]
2020-01-15 04:19:30
123.20.30.123 attackbotsspam
Invalid user admin from 123.20.30.123 port 45101
2020-01-15 04:00:29
5.3.6.82 attack
Jan 14 23:18:32 main sshd[26481]: Failed password for invalid user alex from 5.3.6.82 port 60076 ssh2
2020-01-15 04:19:13
61.255.9.9 attack
Invalid user admin from 61.255.9.9 port 49905
2020-01-15 04:12:36
182.61.39.254 attackbotsspam
Unauthorized connection attempt detected from IP address 182.61.39.254 to port 2220 [J]
2020-01-15 04:30:56
103.134.3.58 attackbotsspam
Invalid user admin from 103.134.3.58 port 37748
2020-01-15 04:08:13
116.38.205.177 attackbots
Unauthorized connection attempt detected from IP address 116.38.205.177 to port 2220 [J]
2020-01-15 04:04:20

Recently Reported IPs

119.29.163.103 119.29.42.130 119.29.42.201 119.29.46.40
119.29.49.161 119.29.49.163 119.29.47.192 119.29.46.43
218.176.241.85 119.29.52.130 119.29.9.130 119.29.75.162
119.29.96.17 119.3.125.98 119.29.97.37 119.3.162.117
119.3.194.23 119.3.231.139 119.3.239.198 119.3.243.17