Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Munich

Region: North Dakota

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.157.29.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4982
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;136.157.29.30.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091501 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Sep 16 06:32:02 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 30.29.157.136.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 30.29.157.136.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
195.103.119.26 attack
Unauthorized connection attempt detected from IP address 195.103.119.26 to port 80 [J]
2020-01-23 22:05:30
198.108.66.84 attackbotsspam
3389BruteforceFW21
2020-01-23 22:37:31
45.146.200.199 attackspambots
Autoban   45.146.200.199 AUTH/CONNECT
2020-01-23 22:45:01
188.252.31.162 attack
Unauthorized connection attempt detected from IP address 188.252.31.162 to port 2220 [J]
2020-01-23 22:16:25
123.21.101.82 attackbots
"SMTP brute force auth login attempt."
2020-01-23 22:08:53
189.125.224.4 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-23 22:13:43
165.227.67.64 attackbots
Unauthorized connection attempt detected from IP address 165.227.67.64 to port 2220 [J]
2020-01-23 22:35:09
168.215.63.13 attackbots
HTTP 503 XSS Attempt
2020-01-23 22:30:26
115.75.102.234 attackbotsspam
Unauthorized connection attempt detected from IP address 115.75.102.234 to port 23 [J]
2020-01-23 22:34:55
54.36.87.176 attackspambots
"SSH brute force auth login attempt."
2020-01-23 22:22:51
112.35.26.43 attackbots
Invalid user yangj from 112.35.26.43 port 52326
2020-01-23 22:14:20
151.80.140.166 attackspam
Invalid user cristian from 151.80.140.166 port 44074
2020-01-23 22:42:40
139.99.180.165 attackbots
Invalid user indu from 139.99.180.165 port 45386
2020-01-23 22:17:03
218.92.0.175 attackspambots
Jan 23 14:58:05 legacy sshd[15821]: Failed password for root from 218.92.0.175 port 31231 ssh2
Jan 23 14:58:19 legacy sshd[15821]: error: maximum authentication attempts exceeded for root from 218.92.0.175 port 31231 ssh2 [preauth]
Jan 23 14:58:24 legacy sshd[15828]: Failed password for root from 218.92.0.175 port 1358 ssh2
...
2020-01-23 22:06:50
49.88.112.115 attack
Jan 23 06:52:20 firewall sshd[9542]: Failed password for root from 49.88.112.115 port 37662 ssh2
Jan 23 06:52:23 firewall sshd[9542]: Failed password for root from 49.88.112.115 port 37662 ssh2
Jan 23 06:52:25 firewall sshd[9542]: Failed password for root from 49.88.112.115 port 37662 ssh2
...
2020-01-23 22:46:02

Recently Reported IPs

159.228.209.232 24.242.7.112 1.168.200.134 221.201.196.209
221.8.148.82 218.75.80.3 211.140.50.195 208.84.91.42
208.84.91.36 207.109.102.138 203.8.25.11 157.131.60.28
202.200.144.161 98.51.243.76 200.98.146.189 116.103.57.87
42.120.126.97 28.191.52.61 181.196.196.170 200.54.151.162