Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.29.144.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63176
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;163.29.144.204.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 11:13:22 CST 2025
;; MSG SIZE  rcvd: 107
Host info
204.144.29.163.in-addr.arpa domain name pointer 163-29-144-204.hinet-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
204.144.29.163.in-addr.arpa	name = 163-29-144-204.hinet-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
178.171.43.56 attack
Chat Spam
2020-03-11 13:28:15
103.57.80.47 attack
proto=tcp  .  spt=60414  .  dpt=25  .     Found on 103.57.80.0/24    Dark List de      (56)
2020-03-11 13:45:31
163.44.196.162 attackbots
[portscan] Port scan
2020-03-11 13:04:19
186.139.53.18 attack
Port scan: Attack repeated for 24 hours
2020-03-11 13:14:27
23.12.21.78 attackspam
[portscan] Port scan
2020-03-11 13:03:35
138.197.36.189 attackbotsspam
Mar 11 03:39:53 sd-53420 sshd\[12398\]: Invalid user 123456 from 138.197.36.189
Mar 11 03:39:53 sd-53420 sshd\[12398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.36.189
Mar 11 03:39:55 sd-53420 sshd\[12398\]: Failed password for invalid user 123456 from 138.197.36.189 port 39544 ssh2
Mar 11 03:43:35 sd-53420 sshd\[12843\]: Invalid user password123 from 138.197.36.189
Mar 11 03:43:35 sd-53420 sshd\[12843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.36.189
...
2020-03-11 13:05:52
42.115.71.87 attackspam
1583892783 - 03/11/2020 03:13:03 Host: 42.115.71.87/42.115.71.87 Port: 445 TCP Blocked
2020-03-11 13:46:59
103.139.154.62 attackspam
CMS (WordPress or Joomla) login attempt.
2020-03-11 13:56:17
186.183.199.203 attackspam
proto=tcp  .  spt=41576  .  dpt=25  .     Found on   Blocklist de       (63)
2020-03-11 13:10:33
104.236.151.120 attackspambots
$f2bV_matches
2020-03-11 13:04:40
178.171.69.2 attackspambots
Chat Spam
2020-03-11 13:19:32
165.22.134.111 attackbotsspam
Mar 11 02:54:45 raspberrypi sshd\[11457\]: Failed password for root from 165.22.134.111 port 41098 ssh2Mar 11 03:01:30 raspberrypi sshd\[15325\]: Failed password for root from 165.22.134.111 port 53208 ssh2Mar 11 03:03:26 raspberrypi sshd\[15663\]: Failed password for root from 165.22.134.111 port 58900 ssh2
...
2020-03-11 13:55:36
217.182.206.141 attack
Mar 10 23:01:51 plusreed sshd[29581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.206.141  user=root
Mar 10 23:01:53 plusreed sshd[29581]: Failed password for root from 217.182.206.141 port 42310 ssh2
...
2020-03-11 13:03:54
171.239.134.79 attackspambots
invalid login attempt (tech)
2020-03-11 12:58:31
112.85.42.238 attack
SSH Brute-Force attacks
2020-03-11 13:22:34

Recently Reported IPs

96.208.105.231 225.170.177.193 107.64.244.107 244.158.63.5
204.175.221.235 187.178.190.144 58.73.226.123 56.248.201.80
177.94.63.30 160.138.218.46 203.6.210.201 186.51.255.225
41.221.93.130 181.11.184.19 124.91.107.193 236.116.77.48
35.120.20.182 149.227.205.75 91.20.247.211 55.146.141.20