Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.136.103.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34916
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.136.103.29.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 10:26:04 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 29.103.136.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 29.103.136.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
124.123.108.147 attackbotsspam
Unauthorized connection attempt from IP address 124.123.108.147 on Port 445(SMB)
2019-07-11 12:59:41
77.247.110.213 attackbotsspam
Port scan attempt detected by AWS-CCS, CTS, India
2019-07-11 12:36:45
37.239.27.226 attack
Jul 11 00:00:40 web1 postfix/smtpd[21760]: warning: unknown[37.239.27.226]: SASL PLAIN authentication failed: authentication failure
...
2019-07-11 13:15:43
51.255.173.222 attackbotsspam
Jul 11 06:02:58 ubuntu-2gb-nbg1-dc3-1 sshd[3560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.173.222
Jul 11 06:02:59 ubuntu-2gb-nbg1-dc3-1 sshd[3560]: Failed password for invalid user tps from 51.255.173.222 port 52924 ssh2
...
2019-07-11 12:39:20
198.108.67.107 attack
8416/tcp 1830/tcp 1981/tcp...
[2019-05-11/07-11]114pkt,103pt.(tcp)
2019-07-11 13:00:08
36.74.75.31 attackbots
Jul 11 03:27:24 XXXXXX sshd[58848]: Invalid user stats from 36.74.75.31 port 37857
2019-07-11 13:12:44
91.238.248.251 attackspambots
[portscan] Port scan
2019-07-11 12:34:18
216.45.23.6 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.45.23.6  user=root
Failed password for root from 216.45.23.6 port 58746 ssh2
Invalid user ftp from 216.45.23.6 port 47993
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.45.23.6
Failed password for invalid user ftp from 216.45.23.6 port 47993 ssh2
2019-07-11 13:13:36
37.120.135.221 attack
\[2019-07-11 00:24:52\] NOTICE\[13443\] chan_sip.c: Registration from '\' failed for '37.120.135.221:1208' - Wrong password
\[2019-07-11 00:24:52\] SECURITY\[13451\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-11T00:24:52.041-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="4417",SessionID="0x7f02f8f2dd48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.120.135.221/49517",Challenge="69949a61",ReceivedChallenge="69949a61",ReceivedHash="ff1fca88e3a83a62266667496be68f72"
\[2019-07-11 00:25:54\] NOTICE\[13443\] chan_sip.c: Registration from '\' failed for '37.120.135.221:1344' - Wrong password
\[2019-07-11 00:25:54\] SECURITY\[13451\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-11T00:25:54.833-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="7706",SessionID="0x7f02f94cdc98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.1
2019-07-11 12:42:16
5.196.225.45 attackbotsspam
$f2bV_matches
2019-07-11 12:43:10
104.157.79.5 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-07-11 12:32:08
153.36.242.114 attack
$f2bV_matches
2019-07-11 12:26:45
78.36.106.171 attackbotsspam
'IP reached maximum auth failures for a one day block'
2019-07-11 12:36:17
210.213.148.130 attackbots
firewall-block, port(s): 445/tcp
2019-07-11 12:49:30
2.180.30.220 attackspam
Unauthorized connection attempt from IP address 2.180.30.220 on Port 445(SMB)
2019-07-11 12:48:49

Recently Reported IPs

128.102.201.221 4.94.165.224 48.75.138.50 196.166.134.77
184.55.167.10 233.89.136.221 63.57.111.54 78.200.39.68
124.212.121.20 16.70.234.213 84.91.8.16 198.238.211.171
64.59.190.227 77.247.41.206 162.65.104.124 16.93.39.115
98.135.233.212 101.105.16.113 41.188.141.33 71.111.196.173