Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Mora

Region: Minnesota

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.29.166.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43590
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;134.29.166.8.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Sep 14 01:38:23 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 8.166.29.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 8.166.29.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.222.211.243 attackspambots
SASL Brute Force
2019-07-16 17:04:39
123.190.133.153 attackspambots
2019-07-15 20:29:05 H=(iKyMhF) [123.190.133.153]:51947 I=[192.147.25.65]:587 F= rejected RCPT <2507202191@qq.com>: RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.11) (https://www.spamhaus.org/query/ip/123.190.133.153)
2019-07-15 20:29:12 dovecot_login authenticator failed for (jtqZs5) [123.190.133.153]:53059 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=vscan@lerctr.org)
2019-07-15 20:29:41 dovecot_login authenticator failed for (UtVpi0j) [123.190.133.153]:54460 I=[192.147.25.65]:587: 535 Incorrect authentication data (set_id=virusalert@lerctr.org)
...
2019-07-16 17:37:15
142.93.108.200 attackbotsspam
Jul 16 09:54:36 MainVPS sshd[1624]: Invalid user bs from 142.93.108.200 port 53204
Jul 16 09:54:36 MainVPS sshd[1624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.108.200
Jul 16 09:54:36 MainVPS sshd[1624]: Invalid user bs from 142.93.108.200 port 53204
Jul 16 09:54:39 MainVPS sshd[1624]: Failed password for invalid user bs from 142.93.108.200 port 53204 ssh2
Jul 16 10:00:16 MainVPS sshd[2066]: Invalid user evan from 142.93.108.200 port 51490
...
2019-07-16 17:36:20
91.89.97.195 attackbots
Jul 16 09:37:26 apollo sshd\[28067\]: Invalid user tf2server from 91.89.97.195Jul 16 09:37:28 apollo sshd\[28067\]: Failed password for invalid user tf2server from 91.89.97.195 port 42398 ssh2Jul 16 10:16:14 apollo sshd\[28102\]: Invalid user jules from 91.89.97.195
...
2019-07-16 17:25:51
88.121.72.24 attackbotsspam
Jul 16 11:07:41 OPSO sshd\[21079\]: Invalid user jenkins from 88.121.72.24 port 33998
Jul 16 11:07:41 OPSO sshd\[21079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.121.72.24
Jul 16 11:07:43 OPSO sshd\[21079\]: Failed password for invalid user jenkins from 88.121.72.24 port 33998 ssh2
Jul 16 11:14:44 OPSO sshd\[22009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.121.72.24  user=root
Jul 16 11:14:46 OPSO sshd\[22009\]: Failed password for root from 88.121.72.24 port 33286 ssh2
2019-07-16 17:20:24
192.241.209.207 attackspambots
264/tcp 9001/tcp 22020/tcp...
[2019-05-15/07-14]32pkt,28pt.(tcp),2pt.(udp)
2019-07-16 17:16:22
185.222.211.246 attackspam
$f2bV_matches
2019-07-16 16:57:49
185.222.211.2 attack
Jul 16 10:03:11 relay postfix/smtpd\[16494\]: NOQUEUE: reject: RCPT from unknown\[185.222.211.2\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[185.222.211.2\]\>
Jul 16 10:03:11 relay postfix/smtpd\[16494\]: NOQUEUE: reject: RCPT from unknown\[185.222.211.2\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[185.222.211.2\]\>
Jul 16 10:03:11 relay postfix/smtpd\[16494\]: NOQUEUE: reject: RCPT from unknown\[185.222.211.2\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[185.222.211.2\]\>
Jul 16 10:03:11 relay postfix/smtpd\[16494\]: NOQUEUE: reject: RCPT from unknown\[185.222.211.2\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ p
...
2019-07-16 17:12:22
112.85.42.177 attackbotsspam
2019-07-16T07:44:31.503103+01:00 suse sshd[10864]: User root from 112.85.42.177 not allowed because not listed in AllowUsers
2019-07-16T07:44:37.185174+01:00 suse sshd[10864]: error: PAM: Authentication failure for illegal user root from 112.85.42.177
2019-07-16T07:44:31.503103+01:00 suse sshd[10864]: User root from 112.85.42.177 not allowed because not listed in AllowUsers
2019-07-16T07:44:37.185174+01:00 suse sshd[10864]: error: PAM: Authentication failure for illegal user root from 112.85.42.177
2019-07-16T07:44:31.503103+01:00 suse sshd[10864]: User root from 112.85.42.177 not allowed because not listed in AllowUsers
2019-07-16T07:44:37.185174+01:00 suse sshd[10864]: error: PAM: Authentication failure for illegal user root from 112.85.42.177
2019-07-16T07:44:37.187363+01:00 suse sshd[10864]: Failed keyboard-interactive/pam for invalid user root from 112.85.42.177 port 43069 ssh2
...
2019-07-16 17:19:02
111.67.43.104 attackbotsspam
Jul 15 20:13:49 box kernel: [1329054.377955] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=111.67.43.104 DST=[munged] LEN=52 TOS=0x00 PREC=0x00 TTL=118 ID=26903 DF PROTO=TCP SPT=51414 DPT=65353 WINDOW=8192 RES=0x00 SYN URGP=0 
Jul 15 20:13:52 box kernel: [1329057.452242] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=111.67.43.104 DST=[munged] LEN=52 TOS=0x00 PREC=0x00 TTL=118 ID=5006 DF PROTO=TCP SPT=51414 DPT=65353 WINDOW=8192 RES=0x00 SYN URGP=0 
Jul 15 20:13:58 box kernel: [1329063.458481] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=111.67.43.104 DST=[munged] LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=11930 DF PROTO=TCP SPT=51414 DPT=65353 WINDOW=8192 RES=0x00 SYN URGP=0 
Jul 16 03:31:06 box kernel: [1355290.761223] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=111.67.43.104 DST=[munged] LEN=52 TOS=0x00 PREC=0x00 TTL=118 ID=31517 DF PROTO=TCP SPT=59078 DPT=65353 WINDOW=8192 RES=0x00 SYN URGP=0 
Jul 16 03:31:09 box kernel: [1355293.791141] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=111.67.43.104 DST=[munged] LEN=52 TOS=0x00 PR
2019-07-16 17:05:03
37.204.105.82 attack
Jul 16 01:29:39 ip-172-31-62-245 sshd\[27195\]: Failed password for root from 37.204.105.82 port 37486 ssh2\
Jul 16 01:29:57 ip-172-31-62-245 sshd\[27199\]: Failed password for root from 37.204.105.82 port 37505 ssh2\
Jul 16 01:30:06 ip-172-31-62-245 sshd\[27199\]: Failed password for root from 37.204.105.82 port 37505 ssh2\
Jul 16 01:30:18 ip-172-31-62-245 sshd\[27204\]: Failed password for root from 37.204.105.82 port 37523 ssh2\
Jul 16 01:30:19 ip-172-31-62-245 sshd\[27204\]: Failed password for root from 37.204.105.82 port 37523 ssh2\
2019-07-16 17:27:39
176.65.2.5 attackbotsspam
This IP address was blacklisted for the following reason:  /de/jobs/fahrer-mit-fuehrerschein-ce-m-w-d/&%27%20and%20%27x%27%3D%27y @ 2018-10-15T00:45:56+02:00.
2019-07-16 17:11:25
37.187.12.126 attackbots
Jul 16 09:15:26 animalibera sshd[8437]: Invalid user uno from 37.187.12.126 port 33278
...
2019-07-16 17:28:10
125.212.220.195 attackspambots
/gallery.php
2019-07-16 17:46:37
41.45.207.240 attackspambots
Caught in portsentry honeypot
2019-07-16 17:03:48

Recently Reported IPs

119.91.231.195 180.12.198.19 120.22.31.151 120.22.109.234
58.222.51.85 123.99.119.44 1.132.107.45 200.103.82.43
191.34.106.143 183.27.83.86 3.154.149.85 203.27.190.62
95.160.92.246 190.17.136.39 184.43.97.209 54.144.9.5
121.145.255.23 121.222.229.198 72.118.0.122 138.94.193.43