Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.147.29.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25284
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;152.147.29.140.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011700 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 17 19:04:36 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 140.29.147.152.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.29.147.152.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
219.233.49.250 attackspambots
DATE:2020-04-11 14:14:52, IP:219.233.49.250, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq)
2020-04-12 02:28:54
194.182.76.161 attackspam
DATE:2020-04-11 20:05:10, IP:194.182.76.161, PORT:ssh SSH brute force auth (docker-dc)
2020-04-12 02:25:04
185.216.140.36 attack
Scanning for open ports
2020-04-12 02:35:37
91.204.248.28 attackbotsspam
Apr 11 08:17:03 server1 sshd\[5389\]: Failed password for root from 91.204.248.28 port 36464 ssh2
Apr 11 08:20:06 server1 sshd\[6213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.204.248.28  user=root
Apr 11 08:20:09 server1 sshd\[6213\]: Failed password for root from 91.204.248.28 port 57668 ssh2
Apr 11 08:23:22 server1 sshd\[7040\]: Invalid user gmike from 91.204.248.28
Apr 11 08:23:22 server1 sshd\[7040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.204.248.28 
...
2020-04-12 02:46:44
5.135.161.7 attackspam
SSH Brute-Forcing (server2)
2020-04-12 02:38:27
129.211.10.228 attackspam
SSH brute-force attempt
2020-04-12 02:21:22
101.198.180.207 attackbots
SSH auth scanning - multiple failed logins
2020-04-12 02:39:40
54.37.233.192 attackspam
2020-04-11T19:40:18.423255amanda2.illicoweb.com sshd\[35525\]: Invalid user admin from 54.37.233.192 port 50430
2020-04-11T19:40:18.425525amanda2.illicoweb.com sshd\[35525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.ip-54-37-233.eu
2020-04-11T19:40:20.114224amanda2.illicoweb.com sshd\[35525\]: Failed password for invalid user admin from 54.37.233.192 port 50430 ssh2
2020-04-11T19:43:03.643433amanda2.illicoweb.com sshd\[35592\]: Invalid user arlyn from 54.37.233.192 port 35426
2020-04-11T19:43:03.645650amanda2.illicoweb.com sshd\[35592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.ip-54-37-233.eu
...
2020-04-12 02:44:26
158.69.112.76 attack
Apr 11 19:58:18 srv01 sshd[27653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.112.76  user=root
Apr 11 19:58:21 srv01 sshd[27653]: Failed password for root from 158.69.112.76 port 53916 ssh2
Apr 11 20:02:20 srv01 sshd[27867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.112.76  user=news
Apr 11 20:02:22 srv01 sshd[27867]: Failed password for news from 158.69.112.76 port 33594 ssh2
Apr 11 20:06:17 srv01 sshd[28060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.112.76  user=root
Apr 11 20:06:19 srv01 sshd[28060]: Failed password for root from 158.69.112.76 port 41508 ssh2
...
2020-04-12 02:29:11
167.71.142.180 attackspam
Apr 11 16:00:57 pornomens sshd\[20930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.142.180  user=root
Apr 11 16:00:59 pornomens sshd\[20930\]: Failed password for root from 167.71.142.180 port 54902 ssh2
Apr 11 16:04:30 pornomens sshd\[20964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.142.180  user=root
...
2020-04-12 02:33:31
49.88.112.65 attackbots
Apr 11 20:12:40 vps sshd[716822]: Failed password for root from 49.88.112.65 port 29846 ssh2
Apr 11 20:12:42 vps sshd[716822]: Failed password for root from 49.88.112.65 port 29846 ssh2
Apr 11 20:13:57 vps sshd[722893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Apr 11 20:13:59 vps sshd[722893]: Failed password for root from 49.88.112.65 port 33042 ssh2
Apr 11 20:14:01 vps sshd[722893]: Failed password for root from 49.88.112.65 port 33042 ssh2
...
2020-04-12 02:22:17
139.59.93.93 attack
Apr 11 18:46:47 www sshd\[142201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.93.93  user=root
Apr 11 18:46:48 www sshd\[142201\]: Failed password for root from 139.59.93.93 port 38790 ssh2
Apr 11 18:48:57 www sshd\[142224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.93.93  user=root
...
2020-04-12 02:27:09
1.202.219.245 attackspambots
$f2bV_matches
2020-04-12 02:39:02
177.191.169.238 attack
Apr 11 16:21:54 ip-172-31-62-245 sshd\[24607\]: Invalid user jkarimi from 177.191.169.238\
Apr 11 16:21:56 ip-172-31-62-245 sshd\[24607\]: Failed password for invalid user jkarimi from 177.191.169.238 port 34162 ssh2\
Apr 11 16:25:22 ip-172-31-62-245 sshd\[24654\]: Failed password for root from 177.191.169.238 port 56376 ssh2\
Apr 11 16:28:40 ip-172-31-62-245 sshd\[24675\]: Failed password for root from 177.191.169.238 port 50353 ssh2\
Apr 11 16:31:53 ip-172-31-62-245 sshd\[24700\]: Invalid user portal from 177.191.169.238\
2020-04-12 02:32:15
180.191.120.143 attackspam
1586607278 - 04/11/2020 14:14:38 Host: 180.191.120.143/180.191.120.143 Port: 445 TCP Blocked
2020-04-12 02:37:12

Recently Reported IPs

249.112.195.125 92.99.122.123 168.131.131.239 250.24.109.243
193.140.191.54 232.227.128.125 211.228.247.63 202.88.246.83
173.121.43.133 115.254.26.59 222.46.247.145 235.171.57.21
33.52.54.98 139.208.6.11 149.47.214.106 236.84.15.171
120.154.81.123 142.240.142.115 132.182.192.168 171.100.46.248