Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.29.23.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21423
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.29.23.114.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 21:01:44 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 114.23.29.147.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.23.29.147.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.248.174.193 attackbotsspam
Unauthorized connection attempt detected from IP address 89.248.174.193 to port 7777
2020-06-20 05:43:07
159.203.124.114 attackbotsspam
2033/tcp 2103/tcp 2203/tcp...
[2020-04-23/06-18]40pkt,16pt.(tcp)
2020-06-20 05:58:23
92.246.243.163 attack
Jun 19 23:42:27 vps639187 sshd\[1461\]: Invalid user ftp1 from 92.246.243.163 port 47936
Jun 19 23:42:27 vps639187 sshd\[1461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.246.243.163
Jun 19 23:42:29 vps639187 sshd\[1461\]: Failed password for invalid user ftp1 from 92.246.243.163 port 47936 ssh2
...
2020-06-20 05:44:27
222.186.190.14 attack
Jun 20 03:06:06 gw1 sshd[28527]: Failed password for root from 222.186.190.14 port 14695 ssh2
...
2020-06-20 06:06:32
20.185.30.0 attack
" "
2020-06-20 06:09:24
178.128.21.38 attackspambots
SSH Invalid Login
2020-06-20 05:55:47
46.38.145.254 attackspam
2020-06-19T15:37:13.846517linuxbox-skyline auth[8898]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=xmldump rhost=46.38.145.254
...
2020-06-20 05:53:20
134.209.201.23 attack
3423/tcp 2974/tcp 726/tcp...
[2020-06-01/19]44pkt,15pt.(tcp)
2020-06-20 05:41:48
218.92.0.220 attackbots
Jun 19 23:51:30 piServer sshd[30232]: Failed password for root from 218.92.0.220 port 23836 ssh2
Jun 19 23:51:34 piServer sshd[30232]: Failed password for root from 218.92.0.220 port 23836 ssh2
Jun 19 23:51:37 piServer sshd[30232]: Failed password for root from 218.92.0.220 port 23836 ssh2
...
2020-06-20 06:04:32
62.173.139.187 attackspam
[2020-06-19 18:08:56] NOTICE[1273][C-000030c7] chan_sip.c: Call from '' (62.173.139.187:54826) to extension '01148221530432' rejected because extension not found in context 'public'.
[2020-06-19 18:08:56] SECURITY[1288] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-19T18:08:56.144-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01148221530432",SessionID="0x7f31c01eadb8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.173.139.187/54826",ACLName="no_extension_match"
[2020-06-19 18:09:18] NOTICE[1273][C-000030c9] chan_sip.c: Call from '' (62.173.139.187:62377) to extension '901148221530432' rejected because extension not found in context 'public'.
[2020-06-19 18:09:18] SECURITY[1288] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-19T18:09:18.317-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="901148221530432",SessionID="0x7f31c018ea98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP
...
2020-06-20 06:10:19
222.186.173.238 attack
Automatic report BANNED IP
2020-06-20 05:59:42
74.82.47.10 attackbots
873/tcp 5900/tcp 9200/tcp...
[2020-04-21/06-18]27pkt,15pt.(tcp),1pt.(udp)
2020-06-20 05:47:32
144.217.12.194 attackbotsspam
Invalid user sebastian from 144.217.12.194 port 38472
2020-06-20 06:01:27
45.148.10.115 attack
143/tcp 2443/tcp 9443/tcp...
[2020-04-23/06-19]39pkt,17pt.(tcp)
2020-06-20 06:17:43
212.70.149.82 attack
Jun 19 23:47:36 srv01 postfix/smtpd\[24406\]: warning: unknown\[212.70.149.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 19 23:47:44 srv01 postfix/smtpd\[24495\]: warning: unknown\[212.70.149.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 19 23:47:45 srv01 postfix/smtpd\[29321\]: warning: unknown\[212.70.149.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 19 23:47:45 srv01 postfix/smtpd\[24182\]: warning: unknown\[212.70.149.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 19 23:48:07 srv01 postfix/smtpd\[24495\]: warning: unknown\[212.70.149.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-20 05:48:38

Recently Reported IPs

122.219.97.216 230.47.74.21 216.121.181.255 3.198.78.118
149.247.45.41 129.191.63.229 167.133.138.228 223.164.74.137
151.149.92.0 150.96.61.232 99.11.80.148 23.187.152.150
238.47.204.83 59.115.80.156 116.179.82.45 84.231.20.245
103.73.114.55 199.8.236.142 226.83.252.59 94.111.227.117