Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ammanford

Region: Wales

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.29.153.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24346
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.29.153.197.			IN	A

;; AUTHORITY SECTION:
.			334	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121301 1800 900 604800 86400

;; Query time: 118 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 14 03:42:43 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 197.153.29.2.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 197.153.29.2.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.104.130.57 attackspam
Lines containing failures of 114.104.130.57 (max 1000)
Sep  7 16:09:04 nexus sshd[14633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.104.130.57  user=r.r
Sep  7 16:09:06 nexus sshd[14633]: Failed password for r.r from 114.104.130.57 port 50502 ssh2
Sep  7 16:09:07 nexus sshd[14633]: Received disconnect from 114.104.130.57 port 50502:11: Bye Bye [preauth]
Sep  7 16:09:07 nexus sshd[14633]: Disconnected from 114.104.130.57 port 50502 [preauth]
Sep  7 16:21:17 nexus sshd[14696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.104.130.57  user=r.r
Sep  7 16:21:19 nexus sshd[14696]: Failed password for r.r from 114.104.130.57 port 38177 ssh2
Sep  7 16:21:19 nexus sshd[14696]: Received disconnect from 114.104.130.57 port 38177:11: Bye Bye [preauth]
Sep  7 16:21:19 nexus sshd[14696]: Disconnected from 114.104.130.57 port 38177 [preauth]
Sep  7 16:26:26 nexus sshd[14898]: pam_unix(sshd:a........
------------------------------
2020-09-09 02:53:01
49.88.112.118 attackbotsspam
Sep  8 20:40:46 * sshd[30655]: Failed password for root from 49.88.112.118 port 25292 ssh2
2020-09-09 03:02:29
20.49.2.187 attack
Sep  8 18:47:22 mout sshd[31235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.49.2.187  user=root
Sep  8 18:47:24 mout sshd[31235]: Failed password for root from 20.49.2.187 port 42356 ssh2
2020-09-09 03:06:50
207.74.77.190 attack
Sep  8 11:14:25 dignus sshd[2233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.74.77.190  user=root
Sep  8 11:14:27 dignus sshd[2233]: Failed password for root from 207.74.77.190 port 55726 ssh2
Sep  8 11:17:04 dignus sshd[2381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.74.77.190  user=root
Sep  8 11:17:06 dignus sshd[2381]: Failed password for root from 207.74.77.190 port 47126 ssh2
Sep  8 11:19:46 dignus sshd[2527]: Invalid user packer from 207.74.77.190 port 38516
...
2020-09-09 03:10:16
122.51.177.151 attackbots
Sep  8 20:23:22 ift sshd\[23159\]: Failed password for root from 122.51.177.151 port 46112 ssh2Sep  8 20:26:28 ift sshd\[23751\]: Invalid user oracle from 122.51.177.151Sep  8 20:26:30 ift sshd\[23751\]: Failed password for invalid user oracle from 122.51.177.151 port 52256 ssh2Sep  8 20:29:34 ift sshd\[24156\]: Failed password for root from 122.51.177.151 port 58402 ssh2Sep  8 20:32:37 ift sshd\[24844\]: Invalid user sinus from 122.51.177.151
...
2020-09-09 02:51:13
42.2.175.57 attackspambots
5555/tcp
[2020-09-07]1pkt
2020-09-09 02:44:12
180.76.160.220 attack
(sshd) Failed SSH login from 180.76.160.220 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  7 12:40:04 server sshd[26253]: Invalid user admin from 180.76.160.220 port 56460
Sep  7 12:40:07 server sshd[26253]: Failed password for invalid user admin from 180.76.160.220 port 56460 ssh2
Sep  7 12:44:17 server sshd[27211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.160.220  user=root
Sep  7 12:44:19 server sshd[27211]: Failed password for root from 180.76.160.220 port 37040 ssh2
Sep  7 12:47:27 server sshd[27922]: Invalid user james from 180.76.160.220 port 39674
2020-09-09 03:13:49
52.240.53.155 attack
Hacking
2020-09-09 02:59:02
182.122.21.45 attack
Lines containing failures of 182.122.21.45
Sep  7 18:44:58 nxxxxxxx sshd[26884]: Invalid user fadmin from 182.122.21.45 port 27234
Sep  7 18:44:58 nxxxxxxx sshd[26884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.21.45
Sep  7 18:45:00 nxxxxxxx sshd[26884]: Failed password for invalid user fadmin from 182.122.21.45 port 27234 ssh2
Sep  7 18:45:00 nxxxxxxx sshd[26884]: Received disconnect from 182.122.21.45 port 27234:11: Bye Bye [preauth]
Sep  7 18:45:00 nxxxxxxx sshd[26884]: Disconnected from invalid user fadmin 182.122.21.45 port 27234 [preauth]
Sep  7 18:59:23 nxxxxxxx sshd[28997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.21.45  user=r.r
Sep  7 18:59:25 nxxxxxxx sshd[28997]: Failed password for r.r from 182.122.21.45 port 35900 ssh2
Sep  7 18:59:26 nxxxxxxx sshd[28997]: Received disconnect from 182.122.21.45 port 35900:11: Bye Bye [preauth]
Sep  7 18:59:26 nxxxxxx........
------------------------------
2020-09-09 03:03:10
14.99.81.218 attack
Sep  8 20:23:56 plg sshd[23563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.99.81.218 
Sep  8 20:23:59 plg sshd[23563]: Failed password for invalid user ubnt from 14.99.81.218 port 15543 ssh2
Sep  8 20:27:14 plg sshd[23584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.99.81.218 
Sep  8 20:27:16 plg sshd[23584]: Failed password for invalid user jboss from 14.99.81.218 port 22493 ssh2
Sep  8 20:30:25 plg sshd[23602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.99.81.218  user=root
Sep  8 20:30:27 plg sshd[23602]: Failed password for invalid user root from 14.99.81.218 port 12581 ssh2
...
2020-09-09 02:49:27
107.172.211.78 attackspam
2020-09-07 11:42:03.296187-0500  localhost smtpd[72242]: NOQUEUE: reject: RCPT from unknown[107.172.211.78]: 554 5.7.1 Service unavailable; Client host [107.172.211.78] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=<00fd8916.asainprodate.co>
2020-09-09 02:52:39
69.28.234.137 attackbotsspam
(sshd) Failed SSH login from 69.28.234.137 (CA/Canada/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  8 07:14:35 optimus sshd[12898]: Failed password for root from 69.28.234.137 port 52318 ssh2
Sep  8 08:09:09 optimus sshd[25635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.28.234.137  user=root
Sep  8 08:09:11 optimus sshd[25635]: Failed password for root from 69.28.234.137 port 52859 ssh2
Sep  8 08:14:00 optimus sshd[31531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.28.234.137  user=root
Sep  8 08:14:02 optimus sshd[31531]: Failed password for root from 69.28.234.137 port 40003 ssh2
2020-09-09 03:05:45
37.59.47.61 attackbots
(cxs) cxs mod_security triggered by 37.59.47.61 (FR/France/ns3000828.ip-37-59-47.eu): 1 in the last 3600 secs (CF_ENABLE); Ports: *; Direction: inout; Trigger: LF_CXS; Logs: [Tue Sep 08 20:09:11.063353 2020] [:error] [pid 2555618:tid 47466686805760] [client 37.59.47.61:61609] [client 37.59.47.61] ModSecurity: Access denied with code 403 (phase 2). File "/tmp/20200908-200909-X1fIxRXGPD0CMJAoChHCpAAAAQA-file-Ujn7XG" rejected by the approver script "/etc/cxs/cxscgi.sh": 0 [file "/etc/apache2/conf.d/modsec_vendor_configs/configserver/00_configserver.conf"] [line "7"] [id "1010101"] [msg "ConfigServer Exploit Scanner (cxs) triggered"] [severity "CRITICAL"] [hostname "teknasmuceh.si"] [uri "/wp-content/plugins/wp-file-manager/lib/php/connector.minimal.php"] [unique_id "X1fIxRXGPD0CMJAoChHCpAAAAQA"]
2020-09-09 03:04:28
138.59.146.251 attack
From send-edital-1618-oaltouruguai.com.br-8@vendastop10.com.br Mon Sep 07 13:47:53 2020
Received: from mm146-251.vendastop10.com.br ([138.59.146.251]:46139)
2020-09-09 02:59:26
185.57.152.70 attackspam
185.57.152.70 - - [08/Sep/2020:16:31:58 +0100] "POST /wp-login.php HTTP/1.1" 200 1861 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
185.57.152.70 - - [08/Sep/2020:16:31:59 +0100] "POST /wp-login.php HTTP/1.1" 200 1839 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
185.57.152.70 - - [08/Sep/2020:16:31:59 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-09 02:55:08

Recently Reported IPs

131.206.6.99 181.80.137.36 77.85.27.198 117.211.138.217
97.197.226.52 153.168.251.38 141.241.71.56 155.139.53.205
209.180.36.176 144.24.101.153 10.35.131.183 208.66.246.241
220.134.53.193 115.241.242.179 192.153.5.1 145.37.148.159
107.120.160.67 64.137.8.34 189.34.91.152 102.189.246.215