Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: Jisc Services Limited

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.166.112.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4617
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.166.112.29.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052800 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 29 01:05:29 CST 2019
;; MSG SIZE  rcvd: 118

Host info
Host 29.112.166.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 29.112.166.139.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.211 attackbotsspam
Sep  7 12:41:14 MK-Soft-Root1 sshd\[26701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.211  user=root
Sep  7 12:41:15 MK-Soft-Root1 sshd\[26701\]: Failed password for root from 218.92.0.211 port 15200 ssh2
Sep  7 12:41:18 MK-Soft-Root1 sshd\[26701\]: Failed password for root from 218.92.0.211 port 15200 ssh2
...
2019-09-08 04:04:52
220.175.169.247 attackbots
Unauthorized connection attempt from IP address 220.175.169.247 on Port 445(SMB)
2019-09-08 04:21:44
124.89.8.196 attackbots
Sep712:40:20server2pure-ftpd:\(\?@124.89.8.196\)[WARNING]Authenticationfailedforuser[startappsa]Sep712:40:28server2pure-ftpd:\(\?@124.89.8.196\)[WARNING]Authenticationfailedforuser[www]Sep712:40:38server2pure-ftpd:\(\?@124.89.8.196\)[WARNING]Authenticationfailedforuser[www]Sep712:40:45server2pure-ftpd:\(\?@124.89.8.196\)[WARNING]Authenticationfailedforuser[startappsa]Sep712:40:53server2pure-ftpd:\(\?@124.89.8.196\)[WARNING]Authenticationfailedforuser[www]
2019-09-08 04:27:10
116.239.32.21 attack
Sep  7 22:46:05 www5 sshd\[35824\]: Invalid user server from 116.239.32.21
Sep  7 22:46:05 www5 sshd\[35824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.239.32.21
Sep  7 22:46:07 www5 sshd\[35824\]: Failed password for invalid user server from 116.239.32.21 port 46994 ssh2
...
2019-09-08 03:58:43
61.161.236.202 attackspam
Sep  7 09:06:43 php1 sshd\[8317\]: Invalid user gpadmin from 61.161.236.202
Sep  7 09:06:43 php1 sshd\[8317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.161.236.202
Sep  7 09:06:45 php1 sshd\[8317\]: Failed password for invalid user gpadmin from 61.161.236.202 port 60788 ssh2
Sep  7 09:10:34 php1 sshd\[8736\]: Invalid user 12345 from 61.161.236.202
Sep  7 09:10:34 php1 sshd\[8736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.161.236.202
2019-09-08 04:18:25
192.169.190.2 attack
[SatSep0712:41:35.8371152019][:error][pid854:tid46947727656704][client192.169.190.2:34946][client192.169.190.2]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"/wp-config.php"atREQUEST_FILENAME.[file"/etc/apache2/conf.d/modsec_rules/99_asl_jitp.conf"][line"3498"][id"381206"][rev"1"][msg"Atomicorp.comWAFRules-VirtualJustInTimePatch:AccesstoWordPressconfigurationfileblocked"][data"/wp-config.php"][severity"CRITICAL"][hostname"skyrunningzone.com"][uri"/wp-config.php"][unique_id"XXOJX3npejoogLB5UQLQrQAAABY"][SatSep0712:41:36.1620772019][:error][pid856:tid46947710846720][client192.169.190.2:35078][client192.169.190.2]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"[a-z0-9]~\$"atREQUEST_FILENAME.[file"/etc/apache2/conf.d/modsec_rules/10_asl_rules.conf"][line"1257"][id"390581"][rev"1"][msg"Atomicorp.comWAFRules:AttackBlocked-DataLeakage-attempttoaccessbackupfile\(disablethisruleifyourequireaccesstofilesthatendwithatilde\)"][severity"CRITICAL"][hostname"skyrun
2019-09-08 03:49:35
46.182.18.29 attackbotsspam
Unauthorized access detected from banned ip
2019-09-08 04:28:22
23.129.64.100 attackspambots
Sep  7 18:23:14 rotator sshd\[21272\]: Failed password for root from 23.129.64.100 port 40379 ssh2Sep  7 18:23:17 rotator sshd\[21272\]: Failed password for root from 23.129.64.100 port 40379 ssh2Sep  7 18:23:19 rotator sshd\[21272\]: Failed password for root from 23.129.64.100 port 40379 ssh2Sep  7 18:23:22 rotator sshd\[21272\]: Failed password for root from 23.129.64.100 port 40379 ssh2Sep  7 18:23:25 rotator sshd\[21272\]: Failed password for root from 23.129.64.100 port 40379 ssh2Sep  7 18:23:28 rotator sshd\[21272\]: Failed password for root from 23.129.64.100 port 40379 ssh2
...
2019-09-08 04:19:27
117.1.209.140 attack
Unauthorized connection attempt from IP address 117.1.209.140 on Port 445(SMB)
2019-09-08 04:03:59
177.128.70.240 attackbots
Sep  7 17:48:56 vm-dfa0dd01 sshd[51815]: Invalid user developer from 177.128.70.240 port 43874
...
2019-09-08 04:12:40
207.226.155.196 attackbotsspam
firewall-block, port(s): 445/tcp
2019-09-08 03:55:49
51.254.47.198 attack
Sep  7 16:06:56 ArkNodeAT sshd\[16885\]: Invalid user oracle from 51.254.47.198
Sep  7 16:06:56 ArkNodeAT sshd\[16885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.47.198
Sep  7 16:06:57 ArkNodeAT sshd\[16885\]: Failed password for invalid user oracle from 51.254.47.198 port 39740 ssh2
2019-09-08 04:02:37
83.10.23.144 attackbotsspam
Automatic report - Port Scan Attack
2019-09-08 03:53:05
45.55.95.57 attackspam
Sep  7 13:47:21 dedicated sshd[25085]: Invalid user duser from 45.55.95.57 port 36744
2019-09-08 04:09:16
176.74.124.3 attackbotsspam
firewall-block, port(s): 445/tcp
2019-09-08 04:16:07

Recently Reported IPs

94.102.91.53 14.246.8.178 147.147.16.155 44.233.189.211
89.72.98.94 36.75.140.66 82.216.154.94 46.37.189.140
200.101.24.65 107.170.198.245 119.101.110.197 181.209.88.16
115.138.203.12 211.209.95.215 184.168.27.91 77.174.203.96
87.59.126.191 38.74.155.42 192.99.110.156 133.67.198.163