Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.164.29.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18494
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.164.29.132.			IN	A

;; AUTHORITY SECTION:
.			176	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 19:26:12 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 132.29.164.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 132.29.164.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.68.122.155 attack
Sep 12 15:17:53 markkoudstaal sshd[2624]: Failed password for root from 51.68.122.155 port 32894 ssh2
Sep 12 15:21:54 markkoudstaal sshd[3808]: Failed password for root from 51.68.122.155 port 45666 ssh2
...
2020-09-12 21:33:34
201.222.57.21 attackbots
Sep 12 10:18:34 rush sshd[15229]: Failed password for root from 201.222.57.21 port 47376 ssh2
Sep 12 10:22:15 rush sshd[15296]: Failed password for root from 201.222.57.21 port 40148 ssh2
...
2020-09-12 21:52:27
212.70.149.36 attackbots
2020-09-11 20:57:47 auth_plain authenticator failed for (User) [212.70.149.36]: 535 Incorrect authentication data (set_id=webcheckout@lavrinenko.info)
2020-09-11 20:58:03 auth_plain authenticator failed for (User) [212.70.149.36]: 535 Incorrect authentication data (set_id=webassets@lavrinenko.info)
...
2020-09-12 21:47:47
206.189.124.254 attackspambots
Sep 12 15:42:49 sip sshd[1575134]: Failed password for invalid user gnuworld from 206.189.124.254 port 35064 ssh2
Sep 12 15:48:13 sip sshd[1575172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.124.254  user=root
Sep 12 15:48:15 sip sshd[1575172]: Failed password for root from 206.189.124.254 port 48432 ssh2
...
2020-09-12 21:56:22
94.102.54.199 attackbotsspam
Sep 12 14:58:23 web01.agentur-b-2.de dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=94.102.54.199, lip=185.118.198.210, session=
Sep 12 14:59:26 web01.agentur-b-2.de dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=94.102.54.199, lip=185.118.198.210, session=
Sep 12 14:59:46 web01.agentur-b-2.de dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=94.102.54.199, lip=185.118.198.210, session=
Sep 12 15:00:29 web01.agentur-b-2.de dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=94.102.54.199, lip=185.118.198.210, session=<1QSmYh2vmC9eZjbH>
Sep 12 15:00:35 web01.agentur-b-2.de dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 6 secs): user=
2020-09-12 21:26:51
222.186.175.154 attackbots
Sep 12 15:51:44 router sshd[6986]: Failed password for root from 222.186.175.154 port 10534 ssh2
Sep 12 15:51:48 router sshd[6986]: Failed password for root from 222.186.175.154 port 10534 ssh2
Sep 12 15:51:52 router sshd[6986]: Failed password for root from 222.186.175.154 port 10534 ssh2
Sep 12 15:51:57 router sshd[6986]: Failed password for root from 222.186.175.154 port 10534 ssh2
...
2020-09-12 21:54:32
112.85.42.237 attack
Sep 11 20:24:41 propaganda sshd[22547]: Connection from 112.85.42.237 port 54552 on 10.0.0.161 port 22 rdomain ""
Sep 11 20:24:43 propaganda sshd[22547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
Sep 11 20:24:45 propaganda sshd[22547]: Failed password for root from 112.85.42.237 port 54552 ssh2
2020-09-12 21:41:19
41.45.16.212 attack
Threat Management Alert 1: Attempted Administrator Privilege Gain. Signature ET EXPLOIT MVPower DVR Shell UCE. From: 41.45.16.212:35637, to: 192.168.4.99:80, protocol: TCP
2020-09-12 21:42:24
61.177.172.128 attackspambots
Sep 12 15:17:33 serwer sshd\[29348\]: Failed password for root from 61.177.172.128 port 20743 ssh2
Sep 12 15:17:33 serwer sshd\[29348\]: error: maximum authentication attempts exceeded for root from 61.177.172.128 port 20743 ssh2 \[preauth\]
Sep 12 15:17:45 serwer sshd\[29377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.128  user=root
...
2020-09-12 21:51:01
5.202.107.17 attackbots
Lines containing failures of 5.202.107.17
Sep 10 19:56:35 shared07 sshd[19744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.202.107.17  user=r.r
Sep 10 19:56:38 shared07 sshd[19744]: Failed password for r.r from 5.202.107.17 port 59498 ssh2
Sep 10 19:56:38 shared07 sshd[19744]: Received disconnect from 5.202.107.17 port 59498:11: Bye Bye [preauth]
Sep 10 19:56:38 shared07 sshd[19744]: Disconnected from authenticating user r.r 5.202.107.17 port 59498 [preauth]
Sep 10 20:09:18 shared07 sshd[24396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.202.107.17  user=r.r
Sep 10 20:09:21 shared07 sshd[24396]: Failed password for r.r from 5.202.107.17 port 37740 ssh2
Sep 10 20:09:21 shared07 sshd[24396]: Received disconnect from 5.202.107.17 port 37740:11: Bye Bye [preauth]
Sep 10 20:09:21 shared07 sshd[24396]: Disconnected from authenticating user r.r 5.202.107.17 port 37740 [preauth]
Sep 10 ........
------------------------------
2020-09-12 21:49:32
222.186.30.218 attackspam
 TCP (SYN) 222.186.30.218:9090 -> port 22, len 44
2020-09-12 21:46:09
5.188.62.14 attackbots
SSH Bruteforce Attempt on Honeypot
2020-09-12 21:28:14
192.144.146.163 attackspam
SSH Invalid Login
2020-09-12 21:55:10
46.101.43.224 attackspam
(sshd) Failed SSH login from 46.101.43.224 (GB/United Kingdom/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 12 03:49:00 optimus sshd[10925]: Invalid user admin from 46.101.43.224
Sep 12 03:49:00 optimus sshd[10925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.43.224 
Sep 12 03:49:02 optimus sshd[10925]: Failed password for invalid user admin from 46.101.43.224 port 45912 ssh2
Sep 12 03:57:36 optimus sshd[13071]: Invalid user admin from 46.101.43.224
Sep 12 03:57:36 optimus sshd[13071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.43.224
2020-09-12 21:43:56
175.118.126.99 attack
2020-09-12T07:33:32.553113linuxbox-skyline sshd[34738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.118.126.99  user=root
2020-09-12T07:33:34.776736linuxbox-skyline sshd[34738]: Failed password for root from 175.118.126.99 port 25300 ssh2
...
2020-09-12 21:48:38

Recently Reported IPs

161.84.217.241 39.33.106.29 210.191.88.252 250.166.185.187
146.145.149.169 24.18.181.102 15.171.212.66 59.115.216.39
218.48.154.232 91.105.37.254 168.102.161.232 186.114.165.100
15.191.81.11 109.250.12.219 146.99.254.75 143.10.25.164
14.173.123.174 163.169.57.177 157.117.87.183 125.59.209.233