Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.29.204.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20668
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.29.204.164.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 10:00:14 CST 2025
;; MSG SIZE  rcvd: 107
Host info
164.204.29.136.in-addr.arpa domain name pointer 136-29-204-164.cab.webpass.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.204.29.136.in-addr.arpa	name = 136-29-204-164.cab.webpass.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
1.63.44.239 attackspambots
Unauthorised access (Aug  8) SRC=1.63.44.239 LEN=40 TTL=46 ID=8846 TCP DPT=8080 WINDOW=40916 SYN 
Unauthorised access (Aug  8) SRC=1.63.44.239 LEN=40 TTL=46 ID=5019 TCP DPT=8080 WINDOW=40916 SYN
2020-08-09 05:06:05
122.116.7.34 attackbots
$f2bV_matches
2020-08-09 04:47:15
175.24.67.217 attackbotsspam
Brute force attempt
2020-08-09 04:43:33
102.129.254.188 attackspam
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=102.129.254.188
2020-08-09 04:50:13
122.152.211.189 attackspambots
Aug  6 07:05:09 hostnameis sshd[63317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.211.189  user=r.r
Aug  6 07:05:11 hostnameis sshd[63317]: Failed password for r.r from 122.152.211.189 port 56502 ssh2
Aug  6 07:05:11 hostnameis sshd[63317]: Received disconnect from 122.152.211.189: 11: Bye Bye [preauth]
Aug  6 07:13:11 hostnameis sshd[63450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.211.189  user=r.r
Aug  6 07:13:13 hostnameis sshd[63450]: Failed password for r.r from 122.152.211.189 port 59078 ssh2
Aug  6 07:13:14 hostnameis sshd[63450]: Received disconnect from 122.152.211.189: 11: Bye Bye [preauth]
Aug  6 07:16:12 hostnameis sshd[63507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.211.189  user=r.r
Aug  6 07:16:14 hostnameis sshd[63507]: Failed password for r.r from 122.152.211.189 port 36854 ssh2
Aug  6 07:16........
------------------------------
2020-08-09 04:41:02
51.81.34.227 attackbots
Aug  8 22:32:22 ncomp sshd[17718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.81.34.227  user=root
Aug  8 22:32:24 ncomp sshd[17718]: Failed password for root from 51.81.34.227 port 43904 ssh2
Aug  8 22:49:00 ncomp sshd[18008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.81.34.227  user=root
Aug  8 22:49:02 ncomp sshd[18008]: Failed password for root from 51.81.34.227 port 41866 ssh2
2020-08-09 04:54:54
114.231.82.97 attackspambots
MAIL: User Login Brute Force Attempt
2020-08-09 05:11:52
81.70.9.97 attack
Aug  4 20:19:28 our-server-hostname sshd[31174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.70.9.97  user=r.r
Aug  4 20:19:30 our-server-hostname sshd[31174]: Failed password for r.r from 81.70.9.97 port 38104 ssh2
Aug  4 20:25:07 our-server-hostname sshd[32348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.70.9.97  user=r.r
Aug  4 20:25:09 our-server-hostname sshd[32348]: Failed password for r.r from 81.70.9.97 port 34054 ssh2
Aug  4 20:30:00 our-server-hostname sshd[938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.70.9.97  user=r.r
Aug  4 20:30:02 our-server-hostname sshd[938]: Failed password for r.r from 81.70.9.97 port 53454 ssh2
Aug  4 20:35:00 our-server-hostname sshd[1984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.70.9.97  user=r.r
Aug  4 20:35:03 our-server-hostname sshd[1........
-------------------------------
2020-08-09 05:16:33
165.227.6.39 attackbotsspam
[Sat Aug 08 15:11:44 2020] - DDoS Attack From IP: 165.227.6.39 Port: 47792
2020-08-09 05:07:49
166.111.68.25 attackspambots
Aug  8 22:26:00 * sshd[18694]: Failed password for root from 166.111.68.25 port 60210 ssh2
2020-08-09 04:52:47
68.183.236.92 attackbotsspam
Aug  8 22:45:00 buvik sshd[4961]: Failed password for root from 68.183.236.92 port 52666 ssh2
Aug  8 22:49:04 buvik sshd[5643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.92  user=root
Aug  8 22:49:05 buvik sshd[5643]: Failed password for root from 68.183.236.92 port 35418 ssh2
...
2020-08-09 04:50:38
186.179.103.118 attack
Aug  8 22:28:44 cosmoit sshd[24084]: Failed password for root from 186.179.103.118 port 46138 ssh2
2020-08-09 04:42:01
14.177.52.15 attack
20/8/8@16:28:38: FAIL: Alarm-Network address from=14.177.52.15
...
2020-08-09 04:48:13
222.186.175.23 attack
Aug  8 23:07:06 eventyay sshd[4742]: Failed password for root from 222.186.175.23 port 45818 ssh2
Aug  8 23:07:08 eventyay sshd[4742]: Failed password for root from 222.186.175.23 port 45818 ssh2
Aug  8 23:07:11 eventyay sshd[4742]: Failed password for root from 222.186.175.23 port 45818 ssh2
...
2020-08-09 05:08:36
36.156.24.91 attackbots
Honeypot hit.
2020-08-09 05:13:58

Recently Reported IPs

201.100.3.1 142.212.106.72 53.178.142.90 252.1.7.201
230.54.249.203 33.92.210.80 26.152.88.184 45.20.153.191
209.144.212.191 116.94.153.122 4.138.178.164 138.150.87.62
150.46.162.78 244.142.48.201 138.12.18.4 205.56.134.137
48.192.122.96 27.14.105.31 23.141.197.136 234.175.158.122