Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
2.29.109.207 attackspambots
Automatic report - Port Scan Attack
2020-02-14 18:32:57
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.29.109.238
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29565
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.29.109.238.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 22:49:40 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 238.109.29.2.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 238.109.29.2.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.59.123.163 attackspambots
Unauthorized connection attempt detected from IP address 139.59.123.163 to port 8545 [J]
2020-01-17 01:03:04
222.186.15.91 attackbots
Unauthorized connection attempt detected from IP address 222.186.15.91 to port 22 [J]
2020-01-17 01:23:29
78.186.136.220 attack
Unauthorized connection attempt from IP address 78.186.136.220 on Port 445(SMB)
2020-01-17 01:07:08
92.63.196.10 attackspambots
firewall-block, port(s): 33893/tcp, 33901/tcp, 33903/tcp, 33930/tcp, 33945/tcp, 33961/tcp, 33976/tcp, 33982/tcp, 33983/tcp, 33999/tcp
2020-01-17 01:23:02
170.81.147.188 attack
Unauthorized connection attempt detected from IP address 170.81.147.188 to port 1433
2020-01-17 01:20:42
117.200.76.7 attackspam
Jan 16 18:20:15 vpn01 sshd[18690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.200.76.7
Jan 16 18:20:18 vpn01 sshd[18690]: Failed password for invalid user deluge from 117.200.76.7 port 59200 ssh2
...
2020-01-17 01:29:01
154.236.146.217 attackbotsspam
Unauthorized connection attempt from IP address 154.236.146.217 on Port 445(SMB)
2020-01-17 00:59:16
80.86.238.53 attackspam
Unauthorized connection attempt from IP address 80.86.238.53 on Port 445(SMB)
2020-01-17 01:09:19
83.245.199.157 attack
Unauthorized connection attempt from IP address 83.245.199.157 on Port 445(SMB)
2020-01-17 00:58:57
193.32.163.9 attackspambots
firewall-block, port(s): 13391/tcp
2020-01-17 01:17:55
168.245.123.156 attackspambots
Absolute nuisance spam about trading... very pushy with several messages sent per day... totally unsolicited... such presentations are not to be trusted when portrayed in this manner. This suspect content is being sent from domain of @m.dripemail2.com designates 168.245.123.156 as permitted sender.
2020-01-17 01:34:04
14.127.250.114 attackspambots
Unauthorized connection attempt detected from IP address 14.127.250.114 to port 1433 [J]
2020-01-17 01:04:00
45.173.224.22 attack
Unauthorized connection attempt from IP address 45.173.224.22 on Port 445(SMB)
2020-01-17 01:12:25
195.5.138.215 attack
Unauthorized connection attempt from IP address 195.5.138.215 on Port 445(SMB)
2020-01-17 00:56:52
142.93.196.133 attackbotsspam
Unauthorized connection attempt detected from IP address 142.93.196.133 to port 2220 [J]
2020-01-17 01:19:00

Recently Reported IPs

2.102.76.240 36.254.55.91 51.189.227.229 245.129.22.132
43.112.72.157 136.37.117.203 201.17.212.253 248.62.72.148
222.23.18.184 225.69.140.193 188.33.180.233 190.190.156.7
210.136.35.126 193.96.64.31 50.24.238.50 91.78.202.140
88.88.14.213 228.56.109.27 53.11.85.170 188.96.159.213