Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.40.29.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42922
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.40.29.22.			IN	A

;; AUTHORITY SECTION:
.			582	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100602 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 05:06:42 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 22.29.40.124.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 22.29.40.124.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.224.226.164 attackbots
Brute force attempt
2020-03-01 18:43:30
181.15.154.154 attackspambots
spam
2020-03-01 18:40:16
194.28.223.242 attackspambots
Brute force attempt
2020-03-01 18:37:13
188.166.46.64 attack
Feb 29 23:50:58 wbs sshd\[22263\]: Invalid user nitish from 188.166.46.64
Feb 29 23:50:58 wbs sshd\[22263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.46.64
Feb 29 23:51:00 wbs sshd\[22263\]: Failed password for invalid user nitish from 188.166.46.64 port 49566 ssh2
Feb 29 23:59:52 wbs sshd\[23094\]: Invalid user robi from 188.166.46.64
Feb 29 23:59:52 wbs sshd\[23094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.46.64
2020-03-01 18:20:41
83.142.197.99 attackbotsspam
email spam
2020-03-01 18:48:57
138.0.210.114 attack
Absender hat Spam-Falle ausgel?st
2020-03-01 18:25:19
173.249.25.170 attack
Mar  1 00:15:21 mockhub sshd[3830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.249.25.170
Mar  1 00:15:23 mockhub sshd[3830]: Failed password for invalid user asterisk from 173.249.25.170 port 41574 ssh2
...
2020-03-01 18:18:48
66.76.58.60 attackbotsspam
spam
2020-03-01 18:28:08
49.234.179.127 attack
Feb 29 23:57:31 tdfoods sshd\[7835\]: Invalid user nextcloud from 49.234.179.127
Feb 29 23:57:31 tdfoods sshd\[7835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.179.127
Feb 29 23:57:33 tdfoods sshd\[7835\]: Failed password for invalid user nextcloud from 49.234.179.127 port 37760 ssh2
Mar  1 00:04:00 tdfoods sshd\[8342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.179.127  user=root
Mar  1 00:04:03 tdfoods sshd\[8342\]: Failed password for root from 49.234.179.127 port 44344 ssh2
2020-03-01 18:13:45
198.108.66.77 attackbotsspam
spam
2020-03-01 18:31:29
51.75.52.127 attackbots
Unauthorized connection attempt detected from IP address 51.75.52.127 to port 7444 [J]
2020-03-01 18:14:19
180.76.192.91 attack
spam
2020-03-01 18:23:14
213.80.166.5 attackspambots
spam
2020-03-01 18:21:25
212.107.232.45 attackspambots
spam
2020-03-01 18:21:51
177.131.204.179 attack
spam
2020-03-01 18:40:38

Recently Reported IPs

109.244.72.235 1.117.30.93 175.115.231.167 221.230.161.17
179.217.106.36 77.53.26.108 20.25.181.35 201.137.60.96
91.246.194.8 104.248.130.54 182.34.205.65 37.44.252.220
24.143.127.201 20.226.93.44 181.209.116.20 124.81.9.138
211.185.123.253 121.126.214.87 183.99.88.2 100.37.94.138