Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.74.21.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53927
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.74.21.29.			IN	A

;; AUTHORITY SECTION:
.			162	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023012200 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 23 00:01:03 CST 2023
;; MSG SIZE  rcvd: 105
Host info
Host 29.21.74.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 29.21.74.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
107.151.148.92 attackspambots
TCP port 8080: Scan and connection
2020-04-25 18:59:29
51.77.230.49 attack
SSH invalid-user multiple login attempts
2020-04-25 18:47:17
107.150.74.225 attack
Registration form abuse
2020-04-25 19:15:28
59.36.172.8 attack
DATE:2020-04-25 05:48:41, IP:59.36.172.8, PORT:ssh SSH brute force auth (docker-dc)
2020-04-25 19:16:05
94.182.197.202 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2020-04-25 19:11:20
132.232.35.199 attackbots
(mod_security) mod_security (id:240335) triggered by 132.232.35.199 (CN/China/-): 5 in the last 3600 secs
2020-04-25 19:07:04
138.68.99.46 attackbots
$f2bV_matches
2020-04-25 18:48:39
54.36.183.126 attackbots
"GET /test/license.txt HTTP/1.1" 404 3439 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-25 19:05:40
195.208.30.73 attackbots
Port probing on unauthorized port 1433
2020-04-25 18:46:02
51.161.12.231 attack
Fail2Ban Ban Triggered
2020-04-25 18:59:48
79.118.138.91 attack
Automatic report - Port Scan Attack
2020-04-25 18:52:20
103.4.94.49 attackspam
Port probing on unauthorized port 445
2020-04-25 18:58:01
125.64.98.38 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-04-25 19:15:12
103.40.8.144 attack
Invalid user gy from 103.40.8.144 port 44414
2020-04-25 18:47:51
193.151.70.238 attackspam
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-04-25 19:10:36

Recently Reported IPs

138.123.106.226 138.118.76.64 136.79.139.224 137.148.148.90
134.46.135.152 221.121.219.246 107.15.232.70 131.162.232.54
129.224.215.42 73.112.202.26 215.106.186.101 247.177.153.142
239.64.188.195 231.24.200.92 23.251.74.69 50.81.243.206
125.179.188.85 37.189.93.192 162.85.49.234 230.223.74.129