Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.29.247.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6749
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.29.247.121.			IN	A

;; AUTHORITY SECTION:
.			596	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092300 1800 900 604800 86400

;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 23 14:54:06 CST 2022
;; MSG SIZE  rcvd: 107
Host info
b'Host 121.247.29.138.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 138.29.247.121.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
41.168.8.197 attackbotsspam
Jun 23 01:07:53 server6 sshd[19354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.168.8.197  user=r.r
Jun 23 01:07:54 server6 sshd[19354]: Failed password for r.r from 41.168.8.197 port 41328 ssh2
Jun 23 01:07:54 server6 sshd[19354]: Received disconnect from 41.168.8.197: 11: Bye Bye [preauth]
Jun 23 01:21:34 server6 sshd[29470]: Failed password for invalid user sharon from 41.168.8.197 port 50742 ssh2
Jun 23 01:21:34 server6 sshd[29470]: Received disconnect from 41.168.8.197: 11: Bye Bye [preauth]
Jun 23 01:25:32 server6 sshd[5965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.168.8.197  user=r.r
Jun 23 01:25:34 server6 sshd[5965]: Failed password for r.r from 41.168.8.197 port 56600 ssh2
Jun 23 01:25:34 server6 sshd[5965]: Received disconnect from 41.168.8.197: 11: Bye Bye [preauth]
Jun 23 01:29:28 server6 sshd[12067]: pam_unix(sshd:auth): authentication failure; logname= uid=0........
-------------------------------
2020-06-23 18:48:27
115.77.191.65 attackspam
20/6/22@23:49:26: FAIL: Alarm-Network address from=115.77.191.65
20/6/22@23:49:27: FAIL: Alarm-Network address from=115.77.191.65
...
2020-06-23 19:15:45
188.166.117.213 attackbotsspam
Jun 23 08:26:13 vps sshd[10662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.117.213 
Jun 23 08:26:15 vps sshd[10662]: Failed password for invalid user ubuntu from 188.166.117.213 port 50668 ssh2
Jun 23 08:29:28 vps sshd[10853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.117.213 
...
2020-06-23 19:09:46
43.239.152.194 attackspambots
firewall-block, port(s): 80/tcp
2020-06-23 18:51:29
115.149.182.19 attack
Port scan denied
2020-06-23 18:35:04
51.254.129.128 attackspambots
2020-06-23T11:41:55.944792amanda2.illicoweb.com sshd\[20268\]: Invalid user mysql from 51.254.129.128 port 41087
2020-06-23T11:41:55.949910amanda2.illicoweb.com sshd\[20268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.ip-51-254-129.eu
2020-06-23T11:41:57.592119amanda2.illicoweb.com sshd\[20268\]: Failed password for invalid user mysql from 51.254.129.128 port 41087 ssh2
2020-06-23T11:51:39.992875amanda2.illicoweb.com sshd\[20800\]: Invalid user lucky from 51.254.129.128 port 44536
2020-06-23T11:51:39.995524amanda2.illicoweb.com sshd\[20800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.ip-51-254-129.eu
...
2020-06-23 19:15:25
128.199.207.238 attackspam
(sshd) Failed SSH login from 128.199.207.238 (SG/Singapore/-): 5 in the last 3600 secs
2020-06-23 19:10:17
218.92.0.247 attackspambots
Jun 23 12:42:20 santamaria sshd\[31039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.247  user=root
Jun 23 12:42:21 santamaria sshd\[31039\]: Failed password for root from 218.92.0.247 port 53302 ssh2
Jun 23 12:42:25 santamaria sshd\[31039\]: Failed password for root from 218.92.0.247 port 53302 ssh2
...
2020-06-23 19:10:40
87.251.74.18 attack
Jun 23 12:23:08 debian-2gb-nbg1-2 kernel: \[15166459.495551\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.18 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=27744 PROTO=TCP SPT=54979 DPT=3390 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-23 18:36:37
112.85.42.181 attackspambots
Jun 23 06:45:33 NPSTNNYC01T sshd[28594]: Failed password for root from 112.85.42.181 port 51309 ssh2
Jun 23 06:45:37 NPSTNNYC01T sshd[28594]: Failed password for root from 112.85.42.181 port 51309 ssh2
Jun 23 06:45:40 NPSTNNYC01T sshd[28594]: Failed password for root from 112.85.42.181 port 51309 ssh2
Jun 23 06:45:47 NPSTNNYC01T sshd[28594]: error: maximum authentication attempts exceeded for root from 112.85.42.181 port 51309 ssh2 [preauth]
...
2020-06-23 19:08:50
54.37.68.191 attackspam
Jun 23 10:42:22 hell sshd[14634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.68.191
Jun 23 10:42:24 hell sshd[14634]: Failed password for invalid user pyramid from 54.37.68.191 port 42564 ssh2
...
2020-06-23 18:35:33
107.6.183.164 attackbots
Unauthorized connection attempt
2020-06-23 18:35:49
89.248.168.244 attackspam
 TCP (SYN) 89.248.168.244:57665 -> port 37379, len 44
2020-06-23 19:03:04
40.87.31.208 attackspam
port scan and connect, tcp 22 (ssh)
2020-06-23 19:00:12
104.248.157.118 attack
21580/tcp 25256/tcp 31693/tcp...
[2020-04-22/06-22]182pkt,63pt.(tcp)
2020-06-23 18:38:13

Recently Reported IPs

182.135.14.171 234.7.168.51 23.196.138.233 45.14.224.58
185.163.114.242 106.75.64.150 125.29.169.29 153.1.84.143
1.139.5.221 163.141.92.225 195.214.200.106 215.21.206.206
167.116.25.77 19.216.181.218 45.178.49.77 132.253.9.6
49.19.106.66 110.88.154.75 214.106.223.172 193.103.194.0