Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Juiz de Fora

Region: Minas Gerais

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 201.29.200.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10004
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;201.29.200.8.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012001 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 07:44:50 CST 2025
;; MSG SIZE  rcvd: 105
Host info
8.200.29.201.in-addr.arpa domain name pointer 201-29-200-8.user3p.veloxzone.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.200.29.201.in-addr.arpa	name = 201-29-200-8.user3p.veloxzone.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.146.53.38 attackbotsspam
Honeypot attack, port: 445, PTR: dsl.49.146.53.38.pldt.net.
2020-02-19 15:39:12
177.68.77.3 attackbotsspam
unauthorized connection attempt
2020-02-19 16:10:11
81.12.180.66 attack
unauthorized connection attempt
2020-02-19 15:46:35
52.16.36.128 attackspam
unauthorized connection attempt
2020-02-19 15:57:05
201.1.11.120 attackspam
unauthorized connection attempt
2020-02-19 15:44:02
139.99.236.133 attack
Feb 19 04:53:23 web8 sshd\[28065\]: Invalid user chris from 139.99.236.133
Feb 19 04:53:23 web8 sshd\[28065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.236.133
Feb 19 04:53:25 web8 sshd\[28065\]: Failed password for invalid user chris from 139.99.236.133 port 43120 ssh2
Feb 19 04:56:34 web8 sshd\[29780\]: Invalid user d from 139.99.236.133
Feb 19 04:56:34 web8 sshd\[29780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.236.133
2020-02-19 15:41:19
60.49.110.2 attack
Honeypot attack, port: 81, PTR: 2.110.49.60.brf03-home.tm.net.my.
2020-02-19 15:31:32
212.156.69.114 attackbots
unauthorized connection attempt
2020-02-19 15:50:48
115.77.123.2 attackbots
unauthorized connection attempt
2020-02-19 15:36:28
181.143.185.154 attackbots
unauthorized connection attempt
2020-02-19 15:33:04
220.134.141.69 attackbotsspam
unauthorized connection attempt
2020-02-19 15:32:01
177.93.70.234 attackbotsspam
unauthorized connection attempt
2020-02-19 15:52:21
123.203.68.104 attack
unauthorized connection attempt
2020-02-19 16:00:54
181.191.48.9 attackspam
unauthorized connection attempt
2020-02-19 15:39:53
170.106.36.87 attackbotsspam
unauthorized connection attempt
2020-02-19 15:35:00

Recently Reported IPs

238.115.49.211 127.233.77.71 152.165.38.31 54.196.78.52
103.180.3.52 141.141.174.65 162.172.233.38 49.48.185.4
135.121.233.134 115.139.185.148 120.94.33.167 46.52.107.146
161.230.8.39 48.200.243.158 21.111.25.40 76.227.108.105
33.55.169.54 141.161.144.173 87.155.226.150 3.245.95.194