Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.53.29.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43287
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.53.29.44.			IN	A

;; AUTHORITY SECTION:
.			116	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 81 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 12:17:07 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 44.29.53.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 44.29.53.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.111.152.149 attackspam
23.06.2019 21:53:05 - Login Fail on hMailserver 
Detected by ELinOX-hMail-A2F
2019-06-24 10:27:32
185.244.25.212 attack
" "
2019-06-24 10:24:29
185.244.25.247 attack
DATE:2019-06-23_21:54:54, IP:185.244.25.247, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-06-24 10:07:50
84.201.170.54 attack
RDP Bruteforce
2019-06-24 10:20:58
185.53.88.17 attackspambots
" "
2019-06-24 10:04:26
41.250.239.47 attackbots
SSH/22 MH Probe, BF, Hack -
2019-06-24 10:21:31
182.61.43.47 attackspam
Jun 23 19:47:44 ip-172-31-62-245 sshd\[18671\]: Invalid user capensis from 182.61.43.47\
Jun 23 19:47:46 ip-172-31-62-245 sshd\[18671\]: Failed password for invalid user capensis from 182.61.43.47 port 57852 ssh2\
Jun 23 19:51:16 ip-172-31-62-245 sshd\[18692\]: Invalid user test from 182.61.43.47\
Jun 23 19:51:18 ip-172-31-62-245 sshd\[18692\]: Failed password for invalid user test from 182.61.43.47 port 34674 ssh2\
Jun 23 19:52:47 ip-172-31-62-245 sshd\[18698\]: Invalid user ju from 182.61.43.47\
2019-06-24 10:31:12
221.231.6.116 attackspambots
SSH invalid-user multiple login try
2019-06-24 10:00:21
185.145.203.195 attackbots
Brute force attempt
2019-06-24 10:26:37
87.240.201.167 attack
FTP Brute-Force reported by Fail2Ban
2019-06-24 10:35:53
193.32.163.182 attackspambots
Jun 24 04:22:22 amit sshd\[14313\]: Invalid user admin from 193.32.163.182
Jun 24 04:22:22 amit sshd\[14313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.163.182
Jun 24 04:22:23 amit sshd\[14313\]: Failed password for invalid user admin from 193.32.163.182 port 34096 ssh2
...
2019-06-24 10:25:21
58.242.82.7 attackbots
Jun 24 04:27:07 dedicated sshd[23863]: Failed password for root from 58.242.82.7 port 42757 ssh2
Jun 24 04:27:11 dedicated sshd[23863]: Failed password for root from 58.242.82.7 port 42757 ssh2
Jun 24 04:27:13 dedicated sshd[23863]: Failed password for root from 58.242.82.7 port 42757 ssh2
Jun 24 04:27:16 dedicated sshd[23863]: Failed password for root from 58.242.82.7 port 42757 ssh2
Jun 24 04:27:19 dedicated sshd[23863]: Failed password for root from 58.242.82.7 port 42757 ssh2
2019-06-24 10:44:02
218.92.0.160 attack
Jun 24 02:29:16 vps647732 sshd[3249]: Failed password for root from 218.92.0.160 port 61337 ssh2
Jun 24 02:29:29 vps647732 sshd[3249]: error: maximum authentication attempts exceeded for root from 218.92.0.160 port 61337 ssh2 [preauth]
...
2019-06-24 10:33:11
171.244.43.172 attack
Jun 24 01:13:40 OPSO sshd\[13358\]: Invalid user git from 171.244.43.172 port 50014
Jun 24 01:13:40 OPSO sshd\[13358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.43.172
Jun 24 01:13:42 OPSO sshd\[13358\]: Failed password for invalid user git from 171.244.43.172 port 50014 ssh2
Jun 24 01:23:35 OPSO sshd\[14085\]: Invalid user git from 171.244.43.172 port 33892
Jun 24 01:23:35 OPSO sshd\[14085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.43.172
2019-06-24 10:10:20
206.81.9.61 attack
missing rdns
2019-06-24 10:03:27

Recently Reported IPs

12.50.9.220 120.0.8.189 120.0.8.204 120.0.8.212
12.9.110.169 120.10.109.121 120.11.188.28 120.11.8.41
120.12.72.70 120.131.0.123 120.131.6.243 120.0.8.34
120.133.3.79 120.132.12.7 120.136.14.45 120.136.14.20
120.15.111.246 120.138.18.164 120.152.172.2 120.138.27.29