Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: New Zealand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.29.147.173
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60504
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.29.147.173.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 03:13:21 CST 2025
;; MSG SIZE  rcvd: 107
Host info
173.147.29.161.in-addr.arpa domain name pointer default-rdns.vocus.co.nz.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
173.147.29.161.in-addr.arpa	name = default-rdns.vocus.co.nz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.225.201.97 attackbotsspam
Automatic report - Port Scan Attack
2019-11-26 21:32:12
222.186.175.148 attack
Nov 26 14:04:37 vpn01 sshd[31209]: Failed password for root from 222.186.175.148 port 56308 ssh2
Nov 26 14:04:48 vpn01 sshd[31209]: Failed password for root from 222.186.175.148 port 56308 ssh2
...
2019-11-26 21:07:02
185.142.236.34 attack
Portscan or hack attempt detected by psad/fwsnort
2019-11-26 20:57:27
81.30.212.14 attackspambots
$f2bV_matches
2019-11-26 20:50:04
45.161.62.194 attackspam
firewall-block, port(s): 23/tcp
2019-11-26 21:30:45
45.81.234.221 attackbots
Invalid user murakawa from 45.81.234.221 port 56732
2019-11-26 20:59:20
124.156.139.104 attackbots
$f2bV_matches
2019-11-26 21:17:04
95.59.208.56 attackspam
Automatic report - Port Scan Attack
2019-11-26 20:47:29
177.69.237.49 attack
SSH bruteforce
2019-11-26 20:55:14
77.170.11.240 attackspam
$f2bV_matches
2019-11-26 21:17:20
106.52.217.229 attackspambots
$f2bV_matches
2019-11-26 21:31:17
202.98.203.29 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2019-11-26 21:18:34
45.227.253.211 attack
Nov 26 13:52:18 relay postfix/smtpd\[24532\]: warning: unknown\[45.227.253.211\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 26 13:52:59 relay postfix/smtpd\[24532\]: warning: unknown\[45.227.253.211\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 26 13:53:06 relay postfix/smtpd\[26248\]: warning: unknown\[45.227.253.211\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 26 13:53:59 relay postfix/smtpd\[23959\]: warning: unknown\[45.227.253.211\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 26 13:54:06 relay postfix/smtpd\[26248\]: warning: unknown\[45.227.253.211\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-26 21:00:27
95.9.144.40 attackbots
Automatic report - Port Scan Attack
2019-11-26 21:33:43
104.140.188.50 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-11-26 21:26:11

Recently Reported IPs

184.249.72.31 123.50.95.148 125.190.99.21 78.135.10.141
244.131.89.61 226.18.49.1 222.154.110.46 214.234.185.75
198.92.16.198 141.85.214.83 66.201.241.180 131.62.43.24
230.115.113.141 213.144.221.93 146.209.160.137 2.238.101.97
225.124.154.207 104.130.216.38 32.197.13.133 72.167.225.92