Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.18.29.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50968
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.18.29.44.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 14:54:58 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 44.29.18.136.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 44.29.18.136.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.168 attackbots
2020-07-03T14:13:40.966433abusebot.cloudsearch.cf sshd[7277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.168  user=root
2020-07-03T14:13:43.152760abusebot.cloudsearch.cf sshd[7277]: Failed password for root from 218.92.0.168 port 55942 ssh2
2020-07-03T14:13:46.066863abusebot.cloudsearch.cf sshd[7277]: Failed password for root from 218.92.0.168 port 55942 ssh2
2020-07-03T14:13:40.966433abusebot.cloudsearch.cf sshd[7277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.168  user=root
2020-07-03T14:13:43.152760abusebot.cloudsearch.cf sshd[7277]: Failed password for root from 218.92.0.168 port 55942 ssh2
2020-07-03T14:13:46.066863abusebot.cloudsearch.cf sshd[7277]: Failed password for root from 218.92.0.168 port 55942 ssh2
2020-07-03T14:13:40.966433abusebot.cloudsearch.cf sshd[7277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.168  user
...
2020-07-03 22:22:53
194.87.138.149 attackbots
port scan and connect, tcp 22 (ssh)
2020-07-03 22:32:22
218.92.0.219 attack
Jul  3 19:25:16 gw1 sshd[5701]: Failed password for root from 218.92.0.219 port 61678 ssh2
...
2020-07-03 22:31:16
112.85.42.89 attackspambots
Jul  3 15:43:30 piServer sshd[18045]: Failed password for root from 112.85.42.89 port 61575 ssh2
Jul  3 15:43:33 piServer sshd[18045]: Failed password for root from 112.85.42.89 port 61575 ssh2
Jul  3 15:43:36 piServer sshd[18045]: Failed password for root from 112.85.42.89 port 61575 ssh2
...
2020-07-03 22:19:50
168.195.170.209 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-07-03 22:27:04
202.28.250.66 attackspambots
/admin/
2020-07-03 22:15:20
141.98.81.210 attackbotsspam
Jul  3 15:30:31 debian64 sshd[11436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.210 
Jul  3 15:30:34 debian64 sshd[11436]: Failed password for invalid user admin from 141.98.81.210 port 33065 ssh2
...
2020-07-03 22:04:02
125.166.177.145 attackbots
1593742249 - 07/03/2020 04:10:49 Host: 125.166.177.145/125.166.177.145 Port: 445 TCP Blocked
2020-07-03 22:15:56
96.127.179.156 attack
$f2bV_matches
2020-07-03 22:13:16
209.85.220.69 attackspam
Received: from mail-sor-f69.google.com (mail-sor-f69.google.com. [209.85.220.69])
        by mx.google.com with SMTPS id t185sor8394064qkb.21.2020.07.03.05.36.11
        for <> (Google Transport Security);
        Fri, 03 Jul 2020 05:36:12 -0700 (PDT)

JohnAudioTech just uploaded a video
How to select audio amplifier input decoupling capacitor value
http://www.youtube.com/watch?v=xzORxnIpbCs&feature=em-uploademail

John N Nay in Vandalia, OH
Current address Po Box 362, Vandalia, OH 45377
    5064 Santa Fe Dr, Dayton, OH 45414
    5062 Santa Fe Dr, Dayton, OH 45414
    3505 Village Dr, APT H, Franklin, OH 45005
    Santa Fe Dr, Dayton, OH 45414	
Current Phone (513) 237-9459
Previous Phones
    (937) 422-1162
    (937) 237-9459
    (513) 422-1162
2020-07-03 22:12:02
119.42.72.31 attack
1593742241 - 07/03/2020 04:10:41 Host: 119.42.72.31/119.42.72.31 Port: 445 TCP Blocked
2020-07-03 22:21:10
222.186.169.192 attackspambots
Jul  3 16:06:33 eventyay sshd[22442]: Failed password for root from 222.186.169.192 port 39326 ssh2
Jul  3 16:06:47 eventyay sshd[22442]: error: maximum authentication attempts exceeded for root from 222.186.169.192 port 39326 ssh2 [preauth]
Jul  3 16:07:00 eventyay sshd[22445]: Failed password for root from 222.186.169.192 port 8432 ssh2
...
2020-07-03 22:09:30
94.62.166.131 attackbots
port scan and connect, tcp 81 (hosts2-ns)
2020-07-03 22:41:14
134.122.134.253 attackbotsspam
Jul  3 14:43:15 ajax sshd[3883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.134.253 
Jul  3 14:43:17 ajax sshd[3883]: Failed password for invalid user zhangyong from 134.122.134.253 port 57924 ssh2
2020-07-03 22:20:33
14.185.23.239 attackspambots
1593742381 - 07/03/2020 04:13:01 Host: 14.185.23.239/14.185.23.239 Port: 445 TCP Blocked
2020-07-03 22:03:02

Recently Reported IPs

182.178.190.219 96.69.19.91 134.234.149.97 173.93.137.235
78.37.214.97 247.191.3.124 148.223.197.56 249.160.173.228
78.240.80.32 75.170.187.149 95.224.234.14 157.161.147.98
114.56.163.50 228.123.162.49 95.192.240.31 208.209.204.162
221.158.119.202 170.63.28.214 147.160.47.73 16.63.183.125