Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Oberhausen

Region: Nordrhein-Westfalen

Country: Germany

Internet Service Provider: Vodafone

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 178.3.29.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64012
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;178.3.29.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 13:20:45 CST 2025
;; MSG SIZE  rcvd: 104
Host info
99.29.3.178.in-addr.arpa domain name pointer dslb-178-003-029-099.178.003.pools.vodafone-ip.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.29.3.178.in-addr.arpa	name = dslb-178-003-029-099.178.003.pools.vodafone-ip.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
121.22.20.162 attack
2019-07-30T04:23:35.623737lon01.zurich-datacenter.net sshd\[15964\]: Invalid user ts from 121.22.20.162 port 39553
2019-07-30T04:23:35.628142lon01.zurich-datacenter.net sshd\[15964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.22.20.162
2019-07-30T04:23:37.936859lon01.zurich-datacenter.net sshd\[15964\]: Failed password for invalid user ts from 121.22.20.162 port 39553 ssh2
2019-07-30T04:28:11.441447lon01.zurich-datacenter.net sshd\[16069\]: Invalid user cgi from 121.22.20.162 port 34502
2019-07-30T04:28:11.446301lon01.zurich-datacenter.net sshd\[16069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.22.20.162
...
2019-07-30 11:13:32
110.235.249.30 attackspambots
Mail sent to address hacked/leaked from Last.fm
2019-07-30 11:39:26
103.120.226.21 attack
2019-07-30T02:59:35.497220abusebot-6.cloudsearch.cf sshd\[10131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.120.226.21  user=root
2019-07-30 11:23:04
181.115.149.6 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-06-24/07-29]11pkt,1pt.(tcp)
2019-07-30 11:51:16
121.171.117.248 attackspam
Jul 30 04:27:30 MK-Soft-Root1 sshd\[19201\]: Invalid user klind from 121.171.117.248 port 50497
Jul 30 04:27:30 MK-Soft-Root1 sshd\[19201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.171.117.248
Jul 30 04:27:32 MK-Soft-Root1 sshd\[19201\]: Failed password for invalid user klind from 121.171.117.248 port 50497 ssh2
...
2019-07-30 11:41:30
180.248.23.220 attack
Automatic report - Port Scan Attack
2019-07-30 11:19:40
195.208.108.71 attackbots
445/tcp 445/tcp 445/tcp...
[2019-06-18/07-29]6pkt,1pt.(tcp)
2019-07-30 11:36:28
103.233.92.151 attack
445/tcp 445/tcp 445/tcp...
[2019-06-24/07-29]4pkt,1pt.(tcp)
2019-07-30 11:33:34
218.92.0.204 attackspambots
Jul 30 05:57:21 www4 sshd\[19669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204  user=root
Jul 30 05:57:23 www4 sshd\[19669\]: Failed password for root from 218.92.0.204 port 19152 ssh2
Jul 30 05:58:40 www4 sshd\[19706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204  user=root
Jul 30 05:58:42 www4 sshd\[19706\]: Failed password for root from 218.92.0.204 port 39798 ssh2
Jul 30 06:00:36 www4 sshd\[20327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204  user=root
...
2019-07-30 11:09:37
204.14.108.69 attackspambots
Jul 29 10:19:15 xxxxxxx9247313 sshd[10787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.14.108.69  user=r.r
Jul 29 10:19:17 xxxxxxx9247313 sshd[10787]: Failed password for r.r from 204.14.108.69 port 1631 ssh2
Jul 29 10:19:20 xxxxxxx9247313 sshd[10787]: Failed password for r.r from 204.14.108.69 port 1631 ssh2
Jul 29 10:19:22 xxxxxxx9247313 sshd[10787]: Failed password for r.r from 204.14.108.69 port 1631 ssh2
Jul 29 10:19:24 xxxxxxx9247313 sshd[10787]: Failed password for r.r from 204.14.108.69 port 1631 ssh2
Jul 29 10:19:26 xxxxxxx9247313 sshd[10787]: Failed password for r.r from 204.14.108.69 port 1631 ssh2
Jul 29 10:19:27 xxxxxxx9247313 sshd[10794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.14.108.69  user=r.r
Jul 29 10:19:29 xxxxxxx9247313 sshd[10794]: Failed password for r.r from 204.14.108.69 port 2826 ssh2
Jul 29 10:19:31 xxxxxxx9247313 sshd[10794]: Failed password f........
------------------------------
2019-07-30 11:15:33
189.5.4.195 attackbotsspam
23/tcp 23/tcp
[2019-07-11/29]2pkt
2019-07-30 11:46:07
104.248.55.99 attackbotsspam
Jul 30 04:28:03 dedicated sshd[15626]: Invalid user testuser from 104.248.55.99 port 44694
2019-07-30 11:18:34
125.161.105.205 attackspambots
Unauthorised access (Jul 30) SRC=125.161.105.205 LEN=52 TTL=248 ID=16603 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-30 11:35:58
5.188.210.158 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-07-30 11:37:29
123.142.192.18 attackbots
Jul 30 06:09:09 site3 sshd\[88430\]: Invalid user cisco from 123.142.192.18
Jul 30 06:09:09 site3 sshd\[88430\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.142.192.18
Jul 30 06:09:12 site3 sshd\[88430\]: Failed password for invalid user cisco from 123.142.192.18 port 58540 ssh2
Jul 30 06:14:18 site3 sshd\[88567\]: Invalid user priv from 123.142.192.18
Jul 30 06:14:18 site3 sshd\[88567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.142.192.18
...
2019-07-30 11:21:34

Recently Reported IPs

210.142.181.207 91.145.155.229 39.26.44.247 97.225.116.21
142.203.61.61 80.43.138.231 125.214.27.18 184.35.47.224
94.189.62.55 13.122.8.138 230.82.241.168 143.69.246.171
250.200.216.148 21.7.204.14 36.127.12.222 15.172.161.171
72.172.33.75 87.16.15.151 201.56.205.170 57.242.218.250