Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.29.211.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5526
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;152.29.211.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 21:12:31 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 54.211.29.152.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 152.29.211.54.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
88.247.152.133 attack
23/tcp
[2019-07-30]1pkt
2019-07-31 04:32:33
2.186.60.192 attackbotsspam
23/tcp
[2019-07-30]1pkt
2019-07-31 04:20:47
191.100.24.188 attack
Jul 30 21:45:06 debian sshd\[7932\]: Invalid user admin123 from 191.100.24.188 port 39147
Jul 30 21:45:06 debian sshd\[7932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.100.24.188
...
2019-07-31 04:54:31
118.98.96.184 attackbotsspam
Jul 30 19:32:17 nextcloud sshd\[15288\]: Invalid user user from 118.98.96.184
Jul 30 19:32:17 nextcloud sshd\[15288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.98.96.184
Jul 30 19:32:19 nextcloud sshd\[15288\]: Failed password for invalid user user from 118.98.96.184 port 39931 ssh2
...
2019-07-31 04:16:36
58.22.59.26 attack
23/tcp
[2019-07-30]1pkt
2019-07-31 04:50:35
220.187.188.71 attackbots
5500/tcp
[2019-07-30]1pkt
2019-07-31 04:54:11
164.132.230.244 attackspam
Invalid user webmaster from 164.132.230.244 port 46513
2019-07-31 04:22:00
36.68.239.163 attackbots
445/tcp
[2019-07-30]1pkt
2019-07-31 04:35:01
113.116.227.84 attackspambots
23/tcp
[2019-07-30]1pkt
2019-07-31 04:44:18
47.92.109.159 attackspambots
DATE:2019-07-30 14:14:35, IP:47.92.109.159, PORT:ssh brute force auth on SSH service (patata)
2019-07-31 04:23:33
117.3.65.114 attackspam
445/tcp
[2019-07-30]1pkt
2019-07-31 04:37:07
179.191.234.1 attack
44553/tcp
[2019-07-30]1pkt
2019-07-31 04:26:37
181.48.68.54 attack
Triggered by Fail2Ban
2019-07-31 04:20:30
185.105.121.55 attackbots
SSH Brute-Force reported by Fail2Ban
2019-07-31 04:27:22
62.131.72.70 attackbotsspam
Jul 30 16:03:04 gitlab-ci sshd\[11176\]: Invalid user pi from 62.131.72.70Jul 30 16:03:04 gitlab-ci sshd\[11178\]: Invalid user pi from 62.131.72.70
...
2019-07-31 04:25:12

Recently Reported IPs

253.58.105.166 248.240.244.168 191.163.152.25 54.27.136.33
189.169.213.28 32.17.180.227 236.5.48.182 48.142.133.41
94.146.194.203 39.23.231.112 164.35.169.149 122.198.25.65
198.223.250.241 92.25.0.134 68.54.150.127 134.36.81.50
4.48.120.141 63.18.197.210 32.198.134.226 233.190.84.69