Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Mmabatho

Region: Province of North West

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.29.25.84
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27412
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;196.29.25.84.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051800 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat May 18 23:17:59 CST 2019
;; MSG SIZE  rcvd: 116

Host info
Host 84.25.29.196.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 84.25.29.196.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
162.243.146.150 attack
21.06.2019 19:42:48 Connection to port 3128 blocked by firewall
2019-06-22 07:15:27
196.37.111.78 attack
445/tcp
[2019-06-21]1pkt
2019-06-22 07:04:05
177.9.212.52 attack
Request: "GET / HTTP/1.1"
2019-06-22 06:46:49
201.253.8.10 attackspam
Jun 21 21:28:19 mxgate1 postfix/postscreen[20865]: CONNECT from [201.253.8.10]:60828 to [176.31.12.44]:25
Jun 21 21:28:19 mxgate1 postfix/dnsblog[21674]: addr 201.253.8.10 listed by domain zen.spamhaus.org as 127.0.0.11
Jun 21 21:28:19 mxgate1 postfix/dnsblog[21674]: addr 201.253.8.10 listed by domain zen.spamhaus.org as 127.0.0.3
Jun 21 21:28:19 mxgate1 postfix/dnsblog[21674]: addr 201.253.8.10 listed by domain zen.spamhaus.org as 127.0.0.4
Jun 21 21:28:19 mxgate1 postfix/dnsblog[21675]: addr 201.253.8.10 listed by domain cbl.abuseat.org as 127.0.0.2
Jun 21 21:28:19 mxgate1 postfix/dnsblog[21672]: addr 201.253.8.10 listed by domain b.barracudacentral.org as 127.0.0.2
Jun 21 21:28:20 mxgate1 postfix/postscreen[20865]: PREGREET 20 after 1.2 from [201.253.8.10]:60828: HELO iullibmuq.com

Jun 21 21:28:20 mxgate1 postfix/postscreen[20865]: DNSBL rank 4 for [201.253.8.10]:60828
Jun x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=201.253.8.10
2019-06-22 07:31:09
187.108.38.130 attackspambots
445/tcp
[2019-06-21]1pkt
2019-06-22 06:49:56
165.22.57.129 attackspambots
DATE:2019-06-21_21:42:21, IP:165.22.57.129, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-06-22 07:33:28
112.243.217.148 attackspam
23/tcp
[2019-06-21]1pkt
2019-06-22 06:59:45
77.247.110.116 attack
SIP Server BruteForce Attack
2019-06-22 06:52:34
176.124.138.105 attackbotsspam
Request: "GET / HTTP/1.1"
2019-06-22 07:01:51
89.121.201.154 attackspambots
Automatic report - Multiple web server 400 error code
2019-06-22 07:05:08
190.203.227.233 attack
445/tcp 445/tcp
[2019-06-21]2pkt
2019-06-22 07:13:30
193.202.110.22 attackbotsspam
Request: "GET /cgi-bin/cgi-bin1.php HTTP/1.1" Request: "GET /cgi-bin/cgi-bin1.php HTTP/1.1"
2019-06-22 07:28:02
119.40.82.250 attackbots
Request: "GET / HTTP/1.1"
2019-06-22 07:09:53
59.115.129.44 attackbotsspam
37215/tcp
[2019-06-21]1pkt
2019-06-22 06:58:34
195.206.104.83 attack
389/udp
[2019-06-21]1pkt
2019-06-22 07:16:38

Recently Reported IPs

98.183.203.163 67.52.172.32 151.204.25.55 217.32.6.11
172.162.97.182 89.91.181.43 208.48.52.157 79.168.240.145
138.255.0.12 14.219.177.129 175.36.136.86 120.18.163.140
46.7.53.190 150.147.206.113 181.28.254.105 47.142.215.126
88.78.111.113 196.214.151.145 200.130.112.188 115.175.191.92