Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.29.40.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57636
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.29.40.213.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 08:34:49 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 213.40.29.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 213.40.29.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.248.160.193 attackbots
Splunk® : port scan detected:
Aug 25 00:38:27 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:64:c3:d6:0b:ef:f0:08:00 SRC=89.248.160.193 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=37116 PROTO=TCP SPT=41123 DPT=2115 WINDOW=1024 RES=0x00 SYN URGP=0
2019-08-25 13:13:02
95.58.194.141 attackspam
Invalid user teste from 95.58.194.141 port 48682
2019-08-25 13:05:52
218.82.113.175 attackspambots
Unauthorized connection attempt from IP address 218.82.113.175 on Port 445(SMB)
2019-08-25 13:24:39
138.36.189.224 attackspambots
$f2bV_matches
2019-08-25 13:48:04
5.39.37.10 attack
Web scan/attack: detected 1 distinct attempts within a 12-hour window (CGI-BIN)
2019-08-25 12:57:46
182.253.251.74 attack
Unauthorized connection attempt from IP address 182.253.251.74 on Port 445(SMB)
2019-08-25 13:38:37
77.247.110.22 attackspambots
" "
2019-08-25 13:06:30
104.248.32.164 attack
Aug 25 07:26:57 * sshd[28570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.32.164
Aug 25 07:26:59 * sshd[28570]: Failed password for invalid user guest1 from 104.248.32.164 port 59598 ssh2
2019-08-25 13:56:51
165.227.9.184 attack
Aug 25 11:59:35 itv-usvr-02 sshd[23510]: Invalid user graphics from 165.227.9.184 port 37227
Aug 25 11:59:35 itv-usvr-02 sshd[23510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.9.184
Aug 25 11:59:35 itv-usvr-02 sshd[23510]: Invalid user graphics from 165.227.9.184 port 37227
Aug 25 11:59:37 itv-usvr-02 sshd[23510]: Failed password for invalid user graphics from 165.227.9.184 port 37227 ssh2
Aug 25 12:05:07 itv-usvr-02 sshd[23542]: Invalid user karina from 165.227.9.184 port 30282
2019-08-25 13:58:33
37.215.153.155 attack
firewall-block, port(s): 37777/tcp
2019-08-25 12:57:12
188.92.77.12 attack
Aug 25 11:36:30 bacztwo sshd[7819]: Invalid user 0 from 188.92.77.12 port 8135
Aug 25 11:36:43 bacztwo sshd[9536]: Invalid user 22 from 188.92.77.12 port 35329
Aug 25 11:37:05 bacztwo sshd[12431]: Invalid user 101 from 188.92.77.12 port 40784
Aug 25 11:37:11 bacztwo sshd[13132]: Invalid user 123 from 188.92.77.12 port 5341
Aug 25 11:37:21 bacztwo sshd[13870]: Invalid user 1111 from 188.92.77.12 port 18363
Aug 25 11:37:29 bacztwo sshd[14568]: Invalid user 1234 from 188.92.77.12 port 48510
Aug 25 11:37:29 bacztwo sshd[14568]: Invalid user 1234 from 188.92.77.12 port 48510
Aug 25 11:37:34 bacztwo sshd[14568]: error: maximum authentication attempts exceeded for invalid user 1234 from 188.92.77.12 port 48510 ssh2 [preauth]
Aug 25 11:37:40 bacztwo sshd[15674]: Invalid user 1234 from 188.92.77.12 port 20013
Aug 25 11:37:56 bacztwo sshd[16513]: Invalid user 1502 from 188.92.77.12 port 41399
Aug 25 11:38:08 bacztwo sshd[17479]: Invalid user 12345 from 188.92.77.12 port 9856
Aug 25 11:38:18 bacz
...
2019-08-25 13:08:59
176.59.110.56 attackspam
Unauthorized connection attempt from IP address 176.59.110.56 on Port 445(SMB)
2019-08-25 13:11:30
213.248.130.159 attackspambots
Unauthorized connection attempt from IP address 213.248.130.159 on Port 445(SMB)
2019-08-25 13:27:35
178.155.72.118 attackbotsspam
Unauthorized connection attempt from IP address 178.155.72.118 on Port 445(SMB)
2019-08-25 12:59:41
175.139.242.49 attack
Aug 25 07:07:44 srv206 sshd[9964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.242.49  user=root
Aug 25 07:07:46 srv206 sshd[9964]: Failed password for root from 175.139.242.49 port 34834 ssh2
...
2019-08-25 14:04:53

Recently Reported IPs

8.187.43.148 178.202.103.238 66.211.92.89 98.223.53.248
125.143.222.78 48.214.170.79 42.35.115.16 169.43.172.133
144.86.154.97 162.201.31.164 116.74.9.195 247.243.178.114
48.125.165.156 156.125.150.208 147.227.177.104 217.167.245.160
133.175.155.146 187.3.220.112 199.29.1.223 49.59.82.204