Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.29.239.156
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16858
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.29.239.156.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 21:05:28 CST 2025
;; MSG SIZE  rcvd: 107
Host info
156.239.29.134.in-addr.arpa domain name pointer 156-239-29-134.minnesota.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
156.239.29.134.in-addr.arpa	name = 156-239-29-134.minnesota.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
54.36.148.205 attackbots
Automatic report - Banned IP Access
2019-08-19 11:58:31
93.51.29.92 attack
SSH Brute-Force reported by Fail2Ban
2019-08-19 11:22:53
191.53.250.89 attackbotsspam
SASL PLAIN auth failed: ruser=...
2019-08-19 12:14:18
167.114.152.139 attackbots
Aug 19 05:05:14 SilenceServices sshd[31400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.152.139
Aug 19 05:05:16 SilenceServices sshd[31400]: Failed password for invalid user test from 167.114.152.139 port 57766 ssh2
Aug 19 05:10:33 SilenceServices sshd[3355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.152.139
2019-08-19 11:22:10
191.53.254.167 attackspam
SASL PLAIN auth failed: ruser=...
2019-08-19 12:12:49
149.28.34.173 attackspambots
Automatic report - Banned IP Access
2019-08-19 11:55:29
207.154.230.156 attackbots
Aug 18 17:07:33 eddieflores sshd\[11105\]: Invalid user ldap from 207.154.230.156
Aug 18 17:07:33 eddieflores sshd\[11105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.230.156
Aug 18 17:07:34 eddieflores sshd\[11105\]: Failed password for invalid user ldap from 207.154.230.156 port 59564 ssh2
Aug 18 17:12:44 eddieflores sshd\[11631\]: Invalid user jenkins from 207.154.230.156
Aug 18 17:12:44 eddieflores sshd\[11631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.230.156
2019-08-19 11:26:47
84.121.165.180 attackspambots
SSH Brute-Forcing (ownc)
2019-08-19 11:23:57
191.240.193.147 attackspambots
SASL PLAIN auth failed: ruser=...
2019-08-19 12:10:17
168.243.232.149 attackbots
Aug 18 17:23:45 auw2 sshd\[397\]: Invalid user pv from 168.243.232.149
Aug 18 17:23:45 auw2 sshd\[397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip168-243-232-149.intercom.com.sv
Aug 18 17:23:47 auw2 sshd\[397\]: Failed password for invalid user pv from 168.243.232.149 port 59831 ssh2
Aug 18 17:28:21 auw2 sshd\[817\]: Invalid user cfabllc from 168.243.232.149
Aug 18 17:28:21 auw2 sshd\[817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip168-243-232-149.intercom.com.sv
2019-08-19 11:44:36
159.89.199.216 attack
Invalid user impressora from 159.89.199.216 port 44078
2019-08-19 11:31:05
178.44.209.238 attack
Chat Spam
2019-08-19 11:54:10
185.130.144.241 attackbots
Automatic report - Port Scan Attack
2019-08-19 11:36:44
43.227.68.60 attack
Aug 18 17:31:47 sachi sshd\[30481\]: Invalid user ifanw from 43.227.68.60
Aug 18 17:31:47 sachi sshd\[30481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.227.68.60
Aug 18 17:31:49 sachi sshd\[30481\]: Failed password for invalid user ifanw from 43.227.68.60 port 38118 ssh2
Aug 18 17:35:31 sachi sshd\[30827\]: Invalid user chi from 43.227.68.60
Aug 18 17:35:31 sachi sshd\[30827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.227.68.60
2019-08-19 12:03:05
191.53.249.222 attack
SASL PLAIN auth failed: ruser=...
2019-08-19 12:14:58

Recently Reported IPs

181.47.213.189 127.211.182.179 162.241.121.206 69.82.20.79
255.204.13.244 214.132.232.202 139.85.55.215 204.89.66.233
39.152.27.81 81.63.194.138 50.1.30.192 3.168.20.203
240.186.209.215 59.138.78.187 140.240.218.148 234.250.182.85
148.5.125.132 30.206.236.53 36.11.43.122 71.240.93.199