Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Mexico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.227.138.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23616
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.227.138.29.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 00:06:31 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 29.138.227.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 29.138.227.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.30.151.17 attack
Dec  5 14:39:03 tdfoods sshd\[15307\]: Invalid user keiko from 103.30.151.17
Dec  5 14:39:03 tdfoods sshd\[15307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.30.151.17
Dec  5 14:39:06 tdfoods sshd\[15307\]: Failed password for invalid user keiko from 103.30.151.17 port 23138 ssh2
Dec  5 14:46:40 tdfoods sshd\[16124\]: Invalid user saribah from 103.30.151.17
Dec  5 14:46:40 tdfoods sshd\[16124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.30.151.17
2019-12-06 08:53:34
187.16.96.35 attack
22/tcp 22/tcp 22/tcp
[2019-12-05]3pkt
2019-12-06 08:33:00
181.49.132.18 attackspam
Dec  5 19:46:22 TORMINT sshd\[14775\]: Invalid user host from 181.49.132.18
Dec  5 19:46:22 TORMINT sshd\[14775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.132.18
Dec  5 19:46:24 TORMINT sshd\[14775\]: Failed password for invalid user host from 181.49.132.18 port 35326 ssh2
...
2019-12-06 09:06:47
222.252.30.117 attack
Dec  5 19:56:24 sshd: Connection from 222.252.30.117 port 37094
Dec  5 19:56:26 sshd: reverse mapping checking getaddrinfo for static.vnpt-hanoi.com.vn [222.252.30.117] failed - POSSIBLE BREAK-IN ATTEMPT!
Dec  5 19:56:26 sshd: Invalid user holste from 222.252.30.117
Dec  5 19:56:26 sshd: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.30.117
Dec  5 19:56:28 sshd: Failed password for invalid user holste from 222.252.30.117 port 37094 ssh2
Dec  5 19:56:29 sshd: Received disconnect from 222.252.30.117: 11: Bye Bye [preauth]
2019-12-06 08:56:09
60.255.230.202 attackspam
Dec  5 19:19:43 sshd: Connection from 60.255.230.202 port 37008
Dec  5 19:19:48 sshd: Invalid user bale from 60.255.230.202
Dec  5 19:19:48 sshd: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.255.230.202
Dec  5 19:19:50 sshd: Failed password for invalid user bale from 60.255.230.202 port 37008 ssh2
Dec  5 19:19:51 sshd: Received disconnect from 60.255.230.202: 11: Bye Bye [preauth]
2019-12-06 08:54:58
185.139.236.20 attackspam
Dec  6 01:18:12 nextcloud sshd\[27797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.139.236.20  user=daemon
Dec  6 01:18:13 nextcloud sshd\[27797\]: Failed password for daemon from 185.139.236.20 port 46556 ssh2
Dec  6 01:28:20 nextcloud sshd\[7377\]: Invalid user shiraishi from 185.139.236.20
Dec  6 01:28:20 nextcloud sshd\[7377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.139.236.20
...
2019-12-06 08:46:03
218.92.0.170 attackspam
Dec  6 01:47:36 markkoudstaal sshd[476]: Failed password for root from 218.92.0.170 port 57546 ssh2
Dec  6 01:47:47 markkoudstaal sshd[476]: Failed password for root from 218.92.0.170 port 57546 ssh2
Dec  6 01:47:50 markkoudstaal sshd[476]: Failed password for root from 218.92.0.170 port 57546 ssh2
Dec  6 01:47:50 markkoudstaal sshd[476]: error: maximum authentication attempts exceeded for root from 218.92.0.170 port 57546 ssh2 [preauth]
2019-12-06 08:49:33
14.228.143.134 attack
Unauthorized connection attempt from IP address 14.228.143.134 on Port 445(SMB)
2019-12-06 08:40:41
222.186.175.216 attack
Dec  6 01:41:37 mail sshd[8284]: Failed password for root from 222.186.175.216 port 7886 ssh2
Dec  6 01:41:40 mail sshd[8284]: Failed password for root from 222.186.175.216 port 7886 ssh2
Dec  6 01:41:45 mail sshd[8284]: Failed password for root from 222.186.175.216 port 7886 ssh2
Dec  6 01:41:49 mail sshd[8284]: Failed password for root from 222.186.175.216 port 7886 ssh2
2019-12-06 08:48:11
180.76.169.192 attack
Dec  6 05:24:12 gw1 sshd[14359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.169.192
Dec  6 05:24:14 gw1 sshd[14359]: Failed password for invalid user zikos from 180.76.169.192 port 45338 ssh2
...
2019-12-06 08:35:12
37.49.230.29 attackbotsspam
\[2019-12-05 19:20:11\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-05T19:20:11.374-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="2998100011441975359003",SessionID="0x7f26c445f668",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.230.29/60126",ACLName="no_extension_match"
\[2019-12-05 19:20:33\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-05T19:20:33.283-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="2908100011441975359003",SessionID="0x7f26c5edd138",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.230.29/64935",ACLName="no_extension_match"
\[2019-12-05 19:20:55\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-05T19:20:55.884-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="21128100011441975359003",SessionID="0x7f26c445f668",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.230.29/574
2019-12-06 08:28:13
106.12.221.86 attackbots
Dec  5 16:49:02 sshd: Connection from 106.12.221.86 port 58528
Dec  5 16:49:03 sshd: Invalid user web from 106.12.221.86
Dec  5 16:49:03 sshd: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.221.86
Dec  5 16:49:05 sshd: Failed password for invalid user web from 106.12.221.86 port 58528 ssh2
Dec  5 16:49:05 sshd: Received disconnect from 106.12.221.86: 11: Bye Bye [preauth]
2019-12-06 09:01:34
222.186.190.92 attack
detected by Fail2Ban
2019-12-06 08:47:20
132.232.182.190 attackspambots
Dec  5 21:54:39 MK-Soft-Root2 sshd[24585]: Failed password for root from 132.232.182.190 port 55354 ssh2
...
2019-12-06 09:00:45
147.0.220.29 attackbots
2019-12-06T00:30:30.903554shield sshd\[28028\]: Invalid user ajumart from 147.0.220.29 port 46804
2019-12-06T00:30:30.907613shield sshd\[28028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=rrcs-147-0-220-29.central.biz.rr.com
2019-12-06T00:30:32.528259shield sshd\[28028\]: Failed password for invalid user ajumart from 147.0.220.29 port 46804 ssh2
2019-12-06T00:36:56.801115shield sshd\[30365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=rrcs-147-0-220-29.central.biz.rr.com  user=root
2019-12-06T00:36:58.399489shield sshd\[30365\]: Failed password for root from 147.0.220.29 port 57406 ssh2
2019-12-06 08:38:43

Recently Reported IPs

145.188.161.29 211.92.4.202 192.226.7.75 50.34.159.114
174.216.160.203 93.5.58.17 120.157.60.113 130.93.21.96
35.43.70.95 223.10.78.34 210.149.13.100 253.239.38.87
132.58.194.187 5.194.197.231 48.104.122.118 223.167.221.98
173.36.2.64 79.211.130.102 128.130.133.105 17.197.61.227