Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.80.29.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48222
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.80.29.49.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 04:56:51 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 49.29.80.146.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.29.80.146.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
42.113.51.246 attack
Unauthorized connection attempt detected from IP address 42.113.51.246 to port 23 [J]
2020-01-07 16:41:56
177.139.72.85 attackbotsspam
Unauthorized connection attempt detected from IP address 177.139.72.85 to port 80 [J]
2020-01-07 16:53:39
189.0.44.244 attack
Unauthorized connection attempt detected from IP address 189.0.44.244 to port 23 [J]
2020-01-07 16:51:16
118.179.64.203 attackspambots
Unauthorized connection attempt detected from IP address 118.179.64.203 to port 5555 [J]
2020-01-07 16:33:47
218.102.220.87 attack
Unauthorized connection attempt detected from IP address 218.102.220.87 to port 8000 [J]
2020-01-07 16:20:13
123.166.135.210 attackspambots
Unauthorized connection attempt detected from IP address 123.166.135.210 to port 5555 [J]
2020-01-07 16:32:43
181.191.49.22 attack
Unauthorized connection attempt detected from IP address 181.191.49.22 to port 4567 [J]
2020-01-07 16:25:47
54.37.138.172 attackbotsspam
ssh brute force
2020-01-07 16:39:57
186.249.191.134 attack
Unauthorized connection attempt detected from IP address 186.249.191.134 to port 8080 [J]
2020-01-07 16:52:31
192.119.98.176 attack
Unauthorized connection attempt detected from IP address 192.119.98.176 to port 2220 [J]
2020-01-07 16:23:42
148.70.101.245 attackspambots
Jan  6 21:43:57 sachi sshd\[20854\]: Invalid user 22 from 148.70.101.245
Jan  6 21:43:57 sachi sshd\[20854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.101.245
Jan  6 21:43:59 sachi sshd\[20854\]: Failed password for invalid user 22 from 148.70.101.245 port 51032 ssh2
Jan  6 21:47:41 sachi sshd\[21130\]: Invalid user quintela from 148.70.101.245
Jan  6 21:47:41 sachi sshd\[21130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.101.245
2020-01-07 16:30:17
194.36.150.82 attack
Unauthorized connection attempt detected from IP address 194.36.150.82 to port 1433 [J]
2020-01-07 16:50:03
191.205.82.245 attack
Unauthorized connection attempt detected from IP address 191.205.82.245 to port 8080 [J]
2020-01-07 16:24:07
212.129.164.73 attackspambots
Unauthorized connection attempt detected from IP address 212.129.164.73 to port 2220 [J]
2020-01-07 16:21:26
73.57.249.194 attackspambots
Unauthorized connection attempt detected from IP address 73.57.249.194 to port 80
2020-01-07 16:38:09

Recently Reported IPs

18.147.188.220 27.155.91.12 181.238.251.214 212.122.127.160
167.136.153.1 151.196.232.159 157.156.101.172 226.230.120.1
185.225.164.21 234.27.80.0 15.70.224.119 122.113.161.93
191.212.85.231 35.35.226.173 244.101.162.108 201.37.152.44
104.100.203.164 126.43.251.169 123.143.185.115 26.133.190.130