Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.95.29.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17060
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.95.29.72.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 17:59:47 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 72.29.95.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 72.29.95.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
221.239.86.19 attack
SSH Brute-Force attacks
2020-01-05 19:53:43
61.91.126.151 attackbotsspam
Jan 10 04:58:48 vpn sshd[2027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.91.126.151
Jan 10 04:58:50 vpn sshd[2027]: Failed password for invalid user postgres from 61.91.126.151 port 38270 ssh2
Jan 10 05:02:37 vpn sshd[2062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.91.126.151
2020-01-05 19:56:00
62.149.244.161 attack
Jan 14 03:33:52 vpn sshd[5649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.149.244.161
Jan 14 03:33:54 vpn sshd[5649]: Failed password for invalid user dc from 62.149.244.161 port 45378 ssh2
Jan 14 03:36:57 vpn sshd[5666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.149.244.161
2020-01-05 19:42:29
62.12.115.116 attack
Unauthorized connection attempt detected from IP address 62.12.115.116 to port 2220 [J]
2020-01-05 19:45:51
144.217.91.253 attackspambots
2020-01-05T12:09:04.544659host3.slimhost.com.ua sshd[4069107]: Invalid user avis from 144.217.91.253 port 34666
2020-01-05T12:09:04.548758host3.slimhost.com.ua sshd[4069107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=253.ip-144-217-91.net
2020-01-05T12:09:04.544659host3.slimhost.com.ua sshd[4069107]: Invalid user avis from 144.217.91.253 port 34666
2020-01-05T12:09:06.588571host3.slimhost.com.ua sshd[4069107]: Failed password for invalid user avis from 144.217.91.253 port 34666 ssh2
2020-01-05T12:10:51.714972host3.slimhost.com.ua sshd[4069584]: Invalid user ftpuser from 144.217.91.253 port 54666
2020-01-05T12:10:51.718998host3.slimhost.com.ua sshd[4069584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=253.ip-144-217-91.net
2020-01-05T12:10:51.714972host3.slimhost.com.ua sshd[4069584]: Invalid user ftpuser from 144.217.91.253 port 54666
2020-01-05T12:10:53.788984host3.slimhost.com.ua sshd[4069584]: 
...
2020-01-05 19:24:05
62.210.205.249 attackbotsspam
Jan 24 05:46:13 vpn sshd[30759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.205.249
Jan 24 05:46:14 vpn sshd[30759]: Failed password for invalid user adolfo from 62.210.205.249 port 44715 ssh2
Jan 24 05:50:51 vpn sshd[30768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.205.249
2020-01-05 19:30:48
221.238.231.231 attackbots
Unauthorized connection attempt detected from IP address 221.238.231.231 to port 1433 [J]
2020-01-05 19:59:12
62.219.123.30 attackspambots
Feb 27 13:44:43 vpn sshd[9821]: Invalid user admin from 62.219.123.30
Feb 27 13:44:43 vpn sshd[9821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.219.123.30
Feb 27 13:44:45 vpn sshd[9821]: Failed password for invalid user admin from 62.219.123.30 port 39058 ssh2
Feb 27 13:44:47 vpn sshd[9821]: Failed password for invalid user admin from 62.219.123.30 port 39058 ssh2
Feb 27 13:44:50 vpn sshd[9821]: Failed password for invalid user admin from 62.219.123.30 port 39058 ssh2
2020-01-05 19:22:55
62.165.240.113 attackbots
Mar 11 12:47:54 vpn sshd[2153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.165.240.113
Mar 11 12:47:56 vpn sshd[2153]: Failed password for invalid user user from 62.165.240.113 port 50636 ssh2
Mar 11 12:54:39 vpn sshd[2161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.165.240.113
2020-01-05 19:40:41
198.245.53.163 attackbots
Unauthorized connection attempt detected from IP address 198.245.53.163 to port 2220 [J]
2020-01-05 19:49:19
190.109.67.208 attackbotsspam
unauthorized connection attempt
2020-01-05 19:45:13
62.210.7.245 attack
Apr 17 02:44:25 vpn sshd[23490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.7.245  user=root
Apr 17 02:44:27 vpn sshd[23490]: Failed password for root from 62.210.7.245 port 53653 ssh2
Apr 17 02:44:43 vpn sshd[23492]: Invalid user admin from 62.210.7.245
Apr 17 02:44:43 vpn sshd[23492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.7.245
Apr 17 02:44:45 vpn sshd[23492]: Failed password for invalid user admin from 62.210.7.245 port 59062 ssh2
2020-01-05 19:27:20
62.210.168.159 attack
Feb 28 00:24:29 vpn sshd[11300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.168.159  user=root
Feb 28 00:24:30 vpn sshd[11300]: Failed password for root from 62.210.168.159 port 51552 ssh2
Feb 28 00:25:04 vpn sshd[11302]: Invalid user packer from 62.210.168.159
Feb 28 00:25:04 vpn sshd[11302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.168.159
Feb 28 00:25:07 vpn sshd[11302]: Failed password for invalid user packer from 62.210.168.159 port 40000 ssh2
2020-01-05 19:33:01
106.54.123.106 attackspambots
Unauthorized connection attempt detected from IP address 106.54.123.106 to port 2220 [J]
2020-01-05 19:33:17
222.186.175.23 attackspam
Jan  5 12:47:52 localhost sshd\[26899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23  user=root
Jan  5 12:47:54 localhost sshd\[26899\]: Failed password for root from 222.186.175.23 port 62276 ssh2
Jan  5 12:47:58 localhost sshd\[26899\]: Failed password for root from 222.186.175.23 port 62276 ssh2
2020-01-05 19:49:56

Recently Reported IPs

96.20.167.191 93.87.220.117 46.45.148.69 252.59.207.212
209.106.173.141 243.132.216.106 228.243.164.148 32.224.178.107
202.37.76.9 123.14.209.71 7.152.36.160 165.38.69.207
53.10.20.106 3.96.234.202 187.8.54.172 153.106.240.188
241.83.248.143 167.236.133.249 253.31.39.30 214.219.217.14