Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.4.29.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55860
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.4.29.53.			IN	A

;; AUTHORITY SECTION:
.			156	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 11:32:30 CST 2022
;; MSG SIZE  rcvd: 104
Host info
53.29.4.122.in-addr.arpa domain name pointer 53.29.4.122.broad.jn.sd.dynamic.163data.com.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
53.29.4.122.in-addr.arpa	name = 53.29.4.122.broad.jn.sd.dynamic.163data.com.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
173.255.249.78 attackspambots
7657/tcp
[2020-03-27]1pkt
2020-03-28 02:00:44
200.89.178.181 attackbots
SSH Bruteforce attack
2020-03-28 01:52:51
116.109.58.57 attack
SSH Brute Force
2020-03-28 01:54:29
106.12.74.141 attack
Mar 26 13:52:58 itv-usvr-01 sshd[2411]: Invalid user ifconfig from 106.12.74.141
Mar 26 13:52:58 itv-usvr-01 sshd[2411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.74.141
Mar 26 13:52:58 itv-usvr-01 sshd[2411]: Invalid user ifconfig from 106.12.74.141
Mar 26 13:53:00 itv-usvr-01 sshd[2411]: Failed password for invalid user ifconfig from 106.12.74.141 port 49592 ssh2
Mar 26 13:57:21 itv-usvr-01 sshd[2597]: Invalid user victoriano from 106.12.74.141
2020-03-28 02:14:50
189.176.189.13 attackbotsspam
firewall-block, port(s): 139/tcp
2020-03-28 01:48:11
114.40.127.94 attackspambots
Unauthorized connection attempt from IP address 114.40.127.94 on Port 445(SMB)
2020-03-28 01:55:10
121.200.55.37 attack
(sshd) Failed SSH login from 121.200.55.37 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 27 14:46:22 elude sshd[26975]: Invalid user jialiang from 121.200.55.37 port 50286
Mar 27 14:46:24 elude sshd[26975]: Failed password for invalid user jialiang from 121.200.55.37 port 50286 ssh2
Mar 27 14:52:44 elude sshd[27311]: Invalid user xtq from 121.200.55.37 port 36172
Mar 27 14:52:46 elude sshd[27311]: Failed password for invalid user xtq from 121.200.55.37 port 36172 ssh2
Mar 27 14:56:20 elude sshd[27548]: Invalid user ross from 121.200.55.37 port 37940
2020-03-28 02:14:20
74.82.47.32 attack
50075/tcp 2323/tcp 1883/tcp...
[2020-01-26/03-27]25pkt,12pt.(tcp),1pt.(udp)
2020-03-28 02:28:16
138.197.105.79 attackbotsspam
Total attacks: 14
2020-03-28 01:49:08
112.45.122.9 attack
SSH login attempts.
2020-03-28 01:49:33
211.253.10.96 attackspambots
Mar 27 17:48:50 IngegnereFirenze sshd[28125]: Failed password for invalid user idn from 211.253.10.96 port 40514 ssh2
...
2020-03-28 02:10:43
34.77.198.11 attackspam
Invalid user collice from 34.77.198.11 port 46236
2020-03-28 02:21:09
158.69.5.181 attack
Time:     Fri Mar 27 09:12:07 2020 -0300
IP:       158.69.5.181 (CA/Canada/ip181.ip-158-69-5.net)
Failures: 15 (ftpd)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-03-28 02:17:01
92.63.194.107 attackspam
Fail2Ban Ban Triggered (2)
2020-03-28 01:58:57
181.110.240.194 attackbots
5x Failed Password
2020-03-28 02:25:07

Recently Reported IPs

122.4.41.102 122.4.29.62 122.4.41.82 122.4.43.168
122.4.43.204 122.4.45.124 122.4.46.110 122.4.46.84
122.4.46.28 122.4.47.136 122.4.47.127 122.4.46.144
122.4.48.147 122.4.46.205 122.4.42.53 122.4.48.190
122.4.48.4 122.4.49.157 122.4.51.137 122.4.52.77