Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ammanford

Region: Wales

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.29.153.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24346
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.29.153.197.			IN	A

;; AUTHORITY SECTION:
.			334	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121301 1800 900 604800 86400

;; Query time: 118 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 14 03:42:43 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 197.153.29.2.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 197.153.29.2.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
5.135.185.27 attackbots
Invalid user cron from 5.135.185.27 port 60884
2020-07-29 08:30:47
69.30.254.194 attack
 TCP (SYN) 69.30.254.194:45768 -> port 22, len 40
2020-07-29 08:13:45
186.170.120.129 attackspambots
Unauthorized connection attempt from IP address 186.170.120.129 on Port 445(SMB)
2020-07-29 08:15:39
58.146.203.8 attackspam
Automatic report - Banned IP Access
2020-07-29 08:14:15
88.232.53.152 attackbotsspam
query suspecte, Sniffing for wordpress log:/wp-login.php
2020-07-29 08:28:51
158.69.192.35 attack
Jul 29 03:52:18 onepixel sshd[4192522]: Invalid user huxuyang from 158.69.192.35 port 60582
Jul 29 03:52:18 onepixel sshd[4192522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.192.35 
Jul 29 03:52:18 onepixel sshd[4192522]: Invalid user huxuyang from 158.69.192.35 port 60582
Jul 29 03:52:20 onepixel sshd[4192522]: Failed password for invalid user huxuyang from 158.69.192.35 port 60582 ssh2
Jul 29 03:57:00 onepixel sshd[1354]: Invalid user stefano from 158.69.192.35 port 43398
2020-07-29 12:05:12
164.90.184.240 attack
" "
2020-07-29 08:22:46
82.102.21.156 attackbotsspam
Spam comment : ATURCANHEREANDWHERE111291 
where to order  Valtrex in UK  NO PRESCRIPTION next day delivery  
 >>> QULITY CHEAPEST PILLS HERE <<<  
 
 
 BUY NOW HERE WITH DISCOUNT >>>  https://bit.ly/quality-pills  
 
 >>>  VISIT OUR DISCOUNT PHARMACY  <<<  
 
 
TAGS: 
 
discount pharmacy  Valtrex in UK/GB  
purchase  Valtrex online USA pharmacy  
secure ordering  Valtrex online  
cheapest place to order  Valtrex c.o.d. without prescription  
Valtrex cod saturday delivery USA  
low prices  Valtrex medication cod  
Valtrex shipped cod on saturday delivery  
indian  Valtrex next day no prescription USA  
Valtrex cod saturday delivery USA  
discount drugs  Valtrex ups cod USA  
Valtrex no prescription USA  
 
 buy cheapest  Valtrex united states     & 
2020-07-29 08:00:11
117.206.155.82 attack
Spam comment : m5n3min3on2un7fhg355h595hkgmsnnfawlnq2 
homepage
2020-07-29 08:31:37
134.209.63.140 attack
Jul 29 05:57:00 debian-2gb-nbg1-2 kernel: \[18253517.433330\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=134.209.63.140 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=5032 PROTO=TCP SPT=53393 DPT=17320 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-29 12:03:07
5.248.164.76 attack
Spam comment : Добрый день 
Доктор посоветовала 
Лучшая Интернет Аптека 
 
 
яквинус цена +в москве
2020-07-29 08:03:18
61.177.172.41 attackspambots
Jul 29 02:00:39 vps1 sshd[10351]: Failed none for invalid user root from 61.177.172.41 port 21841 ssh2
Jul 29 02:00:40 vps1 sshd[10351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.41  user=root
Jul 29 02:00:43 vps1 sshd[10351]: Failed password for invalid user root from 61.177.172.41 port 21841 ssh2
Jul 29 02:00:48 vps1 sshd[10351]: Failed password for invalid user root from 61.177.172.41 port 21841 ssh2
Jul 29 02:00:53 vps1 sshd[10351]: Failed password for invalid user root from 61.177.172.41 port 21841 ssh2
Jul 29 02:00:59 vps1 sshd[10351]: Failed password for invalid user root from 61.177.172.41 port 21841 ssh2
Jul 29 02:01:04 vps1 sshd[10351]: Failed password for invalid user root from 61.177.172.41 port 21841 ssh2
Jul 29 02:01:05 vps1 sshd[10351]: error: maximum authentication attempts exceeded for invalid user root from 61.177.172.41 port 21841 ssh2 [preauth]
...
2020-07-29 08:05:11
159.89.197.1 attack
SSH Login Bruteforce
2020-07-29 08:12:55
95.142.160.6 attack
2020-07-29T01:18:58.033348vfs-server-01 sshd\[29560\]: Invalid user osbash from 95.142.160.6 port 48802
2020-07-29T01:19:06.176317vfs-server-01 sshd\[29645\]: Invalid user pi from 95.142.160.6 port 37230
2020-07-29T01:19:06.488085vfs-server-01 sshd\[29647\]: Invalid user pi from 95.142.160.6 port 38374
2020-07-29 08:04:52
111.229.79.17 attack
SSH brute force
2020-07-29 08:27:43

Recently Reported IPs

131.206.6.99 181.80.137.36 77.85.27.198 117.211.138.217
97.197.226.52 153.168.251.38 141.241.71.56 155.139.53.205
209.180.36.176 144.24.101.153 10.35.131.183 208.66.246.241
220.134.53.193 115.241.242.179 192.153.5.1 145.37.148.159
107.120.160.67 64.137.8.34 189.34.91.152 102.189.246.215