Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Minnesota State Colleges and Universities

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.29.163.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18853
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;134.29.163.159.			IN	A

;; AUTHORITY SECTION:
.			2897	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019063001 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 01 03:00:34 CST 2019
;; MSG SIZE  rcvd: 118
Host info
159.163.29.134.in-addr.arpa domain name pointer atcc-sbc1.voip.alextech.edu.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
159.163.29.134.in-addr.arpa	name = atcc-sbc1.voip.alextech.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.143.223.130 attackbotsspam
T: f2b postfix aggressive 3x
2020-07-01 10:13:08
176.126.167.167 attackspambots
SSH / Telnet Brute Force Attempts on Honeypot
2020-07-01 10:45:00
14.104.82.249 attack
20 attempts against mh-ssh on sea
2020-07-01 10:47:41
192.99.135.77 attack
[Tue Jun 30 11:31:32 2020] - Syn Flood From IP: 192.99.135.77 Port: 53783
2020-07-01 10:42:18
132.232.248.82 attackbots
Invalid user sammy from 132.232.248.82 port 56760
2020-07-01 10:19:58
149.56.102.43 attackbotsspam
Invalid user mssql from 149.56.102.43 port 43646
2020-07-01 10:39:38
193.32.161.143 attackspambots
06/30/2020-12:14:05.834247 193.32.161.143 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-07-01 10:37:07
111.229.232.224 attackspambots
Jun 30 05:10:21 scw-tender-jepsen sshd[3435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.232.224
Jun 30 05:10:23 scw-tender-jepsen sshd[3435]: Failed password for invalid user zhicheng from 111.229.232.224 port 50890 ssh2
2020-07-01 10:45:46
107.170.113.190 attack
Multiple SSH authentication failures from 107.170.113.190
2020-07-01 10:44:02
157.230.53.57 attackbotsspam
TCP ports : 876 / 2013 / 7763 / 14207 / 16064 / 19930 / 25626 / 25932 / 26527 / 30460
2020-07-01 10:50:29
192.241.226.168 attackspambots
IP 192.241.226.168 attacked honeypot on port: 102 at 6/30/2020 8:58:54 AM
2020-07-01 10:15:25
193.112.79.159 attack
Jun 30 03:43:22 ws19vmsma01 sshd[172225]: Failed password for root from 193.112.79.159 port 52954 ssh2
Jun 30 04:13:48 ws19vmsma01 sshd[245153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.79.159
Jun 30 04:13:49 ws19vmsma01 sshd[245153]: Failed password for invalid user odoo from 193.112.79.159 port 58364 ssh2
...
2020-07-01 10:19:41
171.244.139.178 attackspambots
Jun 30 19:29:10 plex sshd[6241]: Invalid user guest from 171.244.139.178 port 1703
Jun 30 19:29:10 plex sshd[6241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.139.178
Jun 30 19:29:10 plex sshd[6241]: Invalid user guest from 171.244.139.178 port 1703
Jun 30 19:29:12 plex sshd[6241]: Failed password for invalid user guest from 171.244.139.178 port 1703 ssh2
Jun 30 19:32:04 plex sshd[6277]: Invalid user rizky from 171.244.139.178 port 16781
2020-07-01 10:04:32
94.102.49.193 attack
Honeypot hit.
2020-07-01 10:27:03
60.167.178.21 attack
Jun 30 14:13:16 mout sshd[7641]: Connection closed by 60.167.178.21 port 55990 [preauth]
2020-07-01 10:24:25

Recently Reported IPs

96.242.54.131 186.177.232.223 85.43.79.189 120.15.122.101
168.209.77.118 45.249.111.40 36.24.49.181 179.189.202.108
206.138.167.213 118.67.97.50 118.67.214.202 177.0.241.75
92.253.125.186 76.160.7.110 189.94.149.214 91.122.210.84
220.21.223.215 106.233.203.172 96.213.177.157 202.24.150.218