Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cape Town

Region: Western Cape

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.28.29.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29717
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;16.28.29.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 08:12:43 CST 2025
;; MSG SIZE  rcvd: 104
Host info
68.29.28.16.in-addr.arpa domain name pointer ec2-16-28-29-68.af-south-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.29.28.16.in-addr.arpa	name = ec2-16-28-29-68.af-south-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.72.171.34 attack
Apr  4 19:41:24 web9 sshd\[15472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.72.171.34  user=root
Apr  4 19:41:26 web9 sshd\[15472\]: Failed password for root from 103.72.171.34 port 53631 ssh2
Apr  4 19:46:09 web9 sshd\[16175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.72.171.34  user=root
Apr  4 19:46:11 web9 sshd\[16175\]: Failed password for root from 103.72.171.34 port 39182 ssh2
Apr  4 19:50:42 web9 sshd\[16840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.72.171.34  user=root
2020-04-05 18:43:15
167.71.9.180 attackbotsspam
web-1 [ssh] SSH Attack
2020-04-05 18:39:35
37.187.114.136 attackbots
Apr  5 11:24:05 mail sshd[27891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.114.136  user=root
Apr  5 11:24:07 mail sshd[27891]: Failed password for root from 37.187.114.136 port 54448 ssh2
Apr  5 11:33:14 mail sshd[9648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.114.136  user=root
Apr  5 11:33:15 mail sshd[9648]: Failed password for root from 37.187.114.136 port 39584 ssh2
Apr  5 11:40:32 mail sshd[21076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.114.136  user=root
Apr  5 11:40:34 mail sshd[21076]: Failed password for root from 37.187.114.136 port 51640 ssh2
...
2020-04-05 18:26:32
78.188.23.210 attack
firewall-block, port(s): 9530/tcp
2020-04-05 18:47:12
221.122.67.66 attack
Invalid user jcn from 221.122.67.66 port 52542
2020-04-05 18:45:58
181.30.8.146 attackbotsspam
Apr  5 11:05:44 icinga sshd[51381]: Failed password for root from 181.30.8.146 port 53850 ssh2
Apr  5 11:20:14 icinga sshd[9649]: Failed password for root from 181.30.8.146 port 49386 ssh2
...
2020-04-05 18:42:41
51.254.32.102 attackbotsspam
Apr  5 15:09:04 gw1 sshd[4835]: Failed password for root from 51.254.32.102 port 37020 ssh2
...
2020-04-05 18:17:25
222.186.175.215 attackspambots
Apr  5 12:36:23 plex sshd[10817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Apr  5 12:36:25 plex sshd[10817]: Failed password for root from 222.186.175.215 port 38780 ssh2
2020-04-05 18:37:35
182.151.60.73 attack
Invalid user avis from 182.151.60.73 port 34702
2020-04-05 18:15:16
51.91.11.62 attackspam
Apr  5 12:35:53 vps sshd[17767]: Failed password for postgres from 51.91.11.62 port 52708 ssh2
Apr  5 12:37:40 vps sshd[17838]: Failed password for root from 51.91.11.62 port 44472 ssh2
Apr  5 12:39:24 vps sshd[18004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.11.62 
...
2020-04-05 18:55:04
125.209.78.158 attackspam
04/04/2020-23:50:20.545018 125.209.78.158 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-04-05 18:34:48
122.152.197.6 attackspambots
Apr  5 11:29:33 vps sshd[14223]: Failed password for root from 122.152.197.6 port 40626 ssh2
Apr  5 11:37:32 vps sshd[14634]: Failed password for root from 122.152.197.6 port 60568 ssh2
...
2020-04-05 18:44:48
117.50.38.246 attackbots
Apr  5 10:12:08 vps sshd[10394]: Failed password for root from 117.50.38.246 port 56644 ssh2
Apr  5 10:23:05 vps sshd[10860]: Failed password for root from 117.50.38.246 port 43426 ssh2
...
2020-04-05 18:21:14
122.176.38.177 attackspambots
2020-04-05T10:02:20.625900v22018076590370373 sshd[11857]: Failed password for root from 122.176.38.177 port 60596 ssh2
2020-04-05T10:20:24.812504v22018076590370373 sshd[29910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.176.38.177  user=root
2020-04-05T10:20:27.005095v22018076590370373 sshd[29910]: Failed password for root from 122.176.38.177 port 54652 ssh2
2020-04-05T10:29:32.099422v22018076590370373 sshd[20788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.176.38.177  user=root
2020-04-05T10:29:33.187990v22018076590370373 sshd[20788]: Failed password for root from 122.176.38.177 port 51708 ssh2
...
2020-04-05 18:49:49
139.208.201.189 attack
firewall-block, port(s): 23/tcp
2020-04-05 18:39:55

Recently Reported IPs

3.62.178.32 125.64.144.148 109.214.193.170 106.212.144.77
252.60.160.245 167.207.24.67 22.39.96.161 184.235.119.176
50.153.32.1 130.151.81.110 61.151.45.235 130.33.162.56
172.191.196.249 108.227.187.209 95.160.89.72 163.102.117.158
244.249.64.166 187.46.111.68 37.80.71.127 240.26.244.199