Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.29.104.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18922
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;202.29.104.55.			IN	A

;; AUTHORITY SECTION:
.			587	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 00:01:03 CST 2022
;; MSG SIZE  rcvd: 106
Host info
55.104.29.202.in-addr.arpa domain name pointer csa.rmutp.ac.th.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.104.29.202.in-addr.arpa	name = csa.rmutp.ac.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.182.1 attackspam
Invalid user guest from 106.12.182.1 port 37328
2020-04-16 07:19:25
209.141.44.67 attackbots
v+ssh-bruteforce
2020-04-16 07:42:33
114.67.76.166 attack
SSH bruteforce
2020-04-16 07:54:32
171.34.197.241 attackspam
Apr 15 17:50:18 ws24vmsma01 sshd[46889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.34.197.241
Apr 15 17:50:19 ws24vmsma01 sshd[46889]: Failed password for invalid user bot from 171.34.197.241 port 56815 ssh2
...
2020-04-16 07:18:54
49.234.43.39 attack
Invalid user louis from 49.234.43.39 port 39694
2020-04-16 07:53:32
209.17.96.242 attackspambots
port scan and connect, tcp 22 (ssh)
2020-04-16 07:25:32
139.59.67.82 attackspam
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-04-16 07:32:42
182.75.33.14 attackspam
Apr 15 20:00:02 ws24vmsma01 sshd[117279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.33.14
Apr 15 20:00:04 ws24vmsma01 sshd[117279]: Failed password for invalid user mingo from 182.75.33.14 port 2160 ssh2
...
2020-04-16 07:24:30
37.59.229.31 attackbotsspam
Invalid user fnjoroge from 37.59.229.31 port 52640
2020-04-16 07:52:24
115.239.253.241 attack
Apr 14 22:41:39 cumulus sshd[13353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.239.253.241  user=r.r
Apr 14 22:41:41 cumulus sshd[13353]: Failed password for r.r from 115.239.253.241 port 57641 ssh2
Apr 14 22:41:41 cumulus sshd[13353]: Received disconnect from 115.239.253.241 port 57641:11: Bye Bye [preauth]
Apr 14 22:41:41 cumulus sshd[13353]: Disconnected from 115.239.253.241 port 57641 [preauth]
Apr 14 22:48:00 cumulus sshd[13658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.239.253.241  user=r.r
Apr 14 22:48:02 cumulus sshd[13658]: Failed password for r.r from 115.239.253.241 port 59047 ssh2
Apr 14 22:48:02 cumulus sshd[13658]: Received disconnect from 115.239.253.241 port 59047:11: Bye Bye [preauth]
Apr 14 22:48:02 cumulus sshd[13658]: Disconnected from 115.239.253.241 port 59047 [preauth]
Apr 14 22:51:08 cumulus sshd[13808]: pam_unix(sshd:auth): authentication failure........
-------------------------------
2020-04-16 07:24:07
190.64.213.155 attack
Port Scan: Events[2] countPorts[1]: 22 ..
2020-04-16 07:36:51
162.243.132.42 attackbotsspam
Brute force attack stopped by firewall
2020-04-16 07:49:58
152.67.67.89 attackspam
$f2bV_matches
2020-04-16 07:37:04
123.184.42.217 attackbots
Apr 16 04:28:39 webhost01 sshd[19045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.184.42.217
Apr 16 04:28:40 webhost01 sshd[19045]: Failed password for invalid user wt from 123.184.42.217 port 54208 ssh2
...
2020-04-16 07:23:38
106.12.86.193 attack
Invalid user seller from 106.12.86.193 port 35400
2020-04-16 07:36:32

Recently Reported IPs

202.28.62.251 202.28.7.40 202.28.42.19 202.28.118.135
202.29.21.50 202.29.32.181 202.29.236.188 202.29.240.35
202.29.13.182 202.29.14.1 202.29.24.240 202.29.53.6
202.29.62.2 202.29.5.173 202.29.68.221 202.29.72.34
202.29.64.10 202.29.58.23 202.3.175.209 202.3.77.184