Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Redmond

Region: Washington

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.29.55.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56810
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;20.29.55.111.			IN	A

;; AUTHORITY SECTION:
.			501	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019113002 1800 900 604800 86400

;; Query time: 94 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 01 10:42:26 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 111.55.29.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 111.55.29.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.51.242.150 attackspambots
Apr 14 05:49:15 host5 sshd[32370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.242.150  user=root
Apr 14 05:49:18 host5 sshd[32370]: Failed password for root from 122.51.242.150 port 52532 ssh2
...
2020-04-14 16:54:49
111.229.124.97 attackspam
$f2bV_matches
2020-04-14 16:35:59
61.161.186.50 attackspam
04/13/2020-23:49:52.188193 61.161.186.50 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-04-14 16:32:43
45.143.220.209 attack
[2020-04-14 04:55:03] NOTICE[1170][C-00000357] chan_sip.c: Call from '' (45.143.220.209:59346) to extension '011441205804657' rejected because extension not found in context 'public'.
[2020-04-14 04:55:03] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-14T04:55:03.194-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441205804657",SessionID="0x7f6c081949a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.209/59346",ACLName="no_extension_match"
[2020-04-14 04:55:49] NOTICE[1170][C-00000358] chan_sip.c: Call from '' (45.143.220.209:64879) to extension '9011441205804657' rejected because extension not found in context 'public'.
[2020-04-14 04:55:49] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-14T04:55:49.707-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441205804657",SessionID="0x7f6c081949a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4
...
2020-04-14 17:15:23
187.49.133.220 attackspam
Apr 14 08:11:10 icinga sshd[62476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.49.133.220 
Apr 14 08:11:12 icinga sshd[62476]: Failed password for invalid user teamspeak from 187.49.133.220 port 52491 ssh2
Apr 14 08:27:46 icinga sshd[24699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.49.133.220 
...
2020-04-14 16:40:48
94.191.50.151 attackbotsspam
Apr 14 10:30:54 contabo sshd[25162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.50.151
Apr 14 10:30:57 contabo sshd[25162]: Failed password for invalid user svn from 94.191.50.151 port 48838 ssh2
Apr 14 10:34:28 contabo sshd[25301]: Invalid user remc3001 from 94.191.50.151 port 57806
Apr 14 10:34:28 contabo sshd[25301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.50.151
Apr 14 10:34:30 contabo sshd[25301]: Failed password for invalid user remc3001 from 94.191.50.151 port 57806 ssh2
...
2020-04-14 16:41:21
116.105.216.179 attackspambots
Apr 14 08:40:54 sshgateway sshd\[19005\]: Invalid user admin from 116.105.216.179
Apr 14 08:40:55 sshgateway sshd\[19005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.105.216.179
Apr 14 08:40:56 sshgateway sshd\[19005\]: Failed password for invalid user admin from 116.105.216.179 port 8930 ssh2
2020-04-14 16:43:16
201.137.253.74 attackspam
Apr 14 10:27:12 ns382633 sshd\[3491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.137.253.74  user=root
Apr 14 10:27:14 ns382633 sshd\[3491\]: Failed password for root from 201.137.253.74 port 34128 ssh2
Apr 14 10:40:46 ns382633 sshd\[6287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.137.253.74  user=root
Apr 14 10:40:48 ns382633 sshd\[6287\]: Failed password for root from 201.137.253.74 port 41292 ssh2
Apr 14 10:44:33 ns382633 sshd\[6699\]: Invalid user a from 201.137.253.74 port 43398
Apr 14 10:44:33 ns382633 sshd\[6699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.137.253.74
2020-04-14 16:58:48
167.172.124.143 attackspam
firewall-block, port(s): 5571/tcp
2020-04-14 16:51:22
27.128.187.131 attackbotsspam
Apr 14 02:18:48 server1 sshd\[28773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.187.131  user=root
Apr 14 02:18:50 server1 sshd\[28773\]: Failed password for root from 27.128.187.131 port 40880 ssh2
Apr 14 02:23:19 server1 sshd\[31959\]: Invalid user kate from 27.128.187.131
Apr 14 02:23:19 server1 sshd\[31959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.187.131 
Apr 14 02:23:21 server1 sshd\[31959\]: Failed password for invalid user kate from 27.128.187.131 port 37482 ssh2
...
2020-04-14 16:40:15
110.77.243.43 attack
Hits on port : 445
2020-04-14 17:02:29
108.190.31.236 attackbotsspam
Unauthorized connection attempt detected from IP address 108.190.31.236 to port 81
2020-04-14 17:14:19
52.179.199.65 attackbots
rdp brute-force attack (aggressivity: medium)
2020-04-14 17:12:16
122.165.149.75 attack
Apr 14 06:39:01 localhost sshd\[22250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.165.149.75  user=root
Apr 14 06:39:03 localhost sshd\[22250\]: Failed password for root from 122.165.149.75 port 38762 ssh2
Apr 14 06:43:06 localhost sshd\[22607\]: Invalid user catering from 122.165.149.75
Apr 14 06:43:06 localhost sshd\[22607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.165.149.75
Apr 14 06:43:07 localhost sshd\[22607\]: Failed password for invalid user catering from 122.165.149.75 port 38484 ssh2
...
2020-04-14 16:35:17
36.37.124.99 attack
1433/tcp 1433/tcp 1433/tcp...
[2020-03-16/04-14]18pkt,1pt.(tcp)
2020-04-14 17:06:32

Recently Reported IPs

193.111.37.6 84.33.200.190 202.6.75.226 83.203.115.34
52.66.58.167 17.196.183.228 204.85.242.187 66.168.190.158
211.161.73.223 208.98.72.156 75.31.165.95 110.70.223.39
177.182.36.73 24.134.245.184 93.33.224.230 74.192.141.42
214.102.235.1 74.189.170.186 72.190.127.179 177.143.163.180