Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.29.152.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29646
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.29.152.213.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 20:03:50 CST 2025
;; MSG SIZE  rcvd: 107
Host info
213.152.29.122.in-addr.arpa domain name pointer p1636213-ipxg00d01sizuokaden.shizuoka.ocn.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.152.29.122.in-addr.arpa	name = p1636213-ipxg00d01sizuokaden.shizuoka.ocn.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
59.102.253.191 attackspam
SSH login attempts
2020-02-11 19:37:37
202.62.107.135 attack
Honeypot attack, port: 445, PTR: mail1.etlweb.biz.
2020-02-11 19:12:40
173.249.49.120 attackbots
Automatic report - XMLRPC Attack
2020-02-11 19:04:53
45.79.144.216 attackbotsspam
firewall-block, port(s): 6379/tcp
2020-02-11 19:38:11
2a01:4f9:4a:1260::2 attack
Auto reported by IDS
2020-02-11 19:38:41
117.254.184.43 attackspambots
1581413042 - 02/11/2020 10:24:02 Host: 117.254.184.43/117.254.184.43 Port: 445 TCP Blocked
2020-02-11 19:30:16
171.13.139.119 attackspambots
RDPBruteGSL24
2020-02-11 19:13:55
173.252.87.16 attack
Got me
2020-02-11 18:59:36
118.37.188.64 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-11 19:05:16
45.33.80.76 attackspambots
Port 443 (HTTPS) access denied
2020-02-11 19:22:11
188.80.22.177 attack
Automatic report - XMLRPC Attack
2020-02-11 19:03:03
80.82.77.139 attackspambots
Feb 11 11:40:49 debian-2gb-nbg1-2 kernel: \[3676882.372345\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.77.139 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=120 ID=27049 PROTO=TCP SPT=6707 DPT=503 WINDOW=21582 RES=0x00 SYN URGP=0
2020-02-11 19:09:51
180.246.15.2 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 11-02-2020 04:50:11.
2020-02-11 19:28:05
14.162.145.76 attack
Unauthorized connection attempt from IP address 14.162.145.76 on Port 445(SMB)
2020-02-11 19:13:33
112.196.90.180 attackspam
Feb 11 05:50:01 web2 sshd[20859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.196.90.180
Feb 11 05:50:03 web2 sshd[20859]: Failed password for invalid user 666666 from 112.196.90.180 port 49702 ssh2
2020-02-11 19:37:20

Recently Reported IPs

169.90.115.99 39.104.100.199 4.111.252.72 64.213.58.20
220.232.225.139 201.83.59.217 134.97.245.165 207.32.230.141
161.21.210.71 146.206.220.76 145.53.164.181 19.195.108.69
155.176.119.4 109.153.120.85 247.105.223.164 123.31.127.169
233.95.150.215 131.251.248.211 197.43.114.49 131.7.41.97