Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Reno

Region: Nevada

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: N.T. Technology, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.29.243.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25532
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;207.29.243.5.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072201 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jul 23 03:28:43 CST 2019
;; MSG SIZE  rcvd: 116
Host info
5.243.29.207.in-addr.arpa domain name pointer nttec.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
5.243.29.207.in-addr.arpa	name = nttec.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.223.73.20 attack
Sep 15 05:09:00 MK-Soft-Root1 sshd\[9649\]: Invalid user insserver from 111.223.73.20 port 39282
Sep 15 05:09:00 MK-Soft-Root1 sshd\[9649\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.223.73.20
Sep 15 05:09:02 MK-Soft-Root1 sshd\[9649\]: Failed password for invalid user insserver from 111.223.73.20 port 39282 ssh2
...
2019-09-15 11:10:41
95.33.225.176 attackspam
Sep 15 06:37:14 tuotantolaitos sshd[1580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.33.225.176
Sep 15 06:37:16 tuotantolaitos sshd[1580]: Failed password for invalid user erp from 95.33.225.176 port 33252 ssh2
...
2019-09-15 11:38:28
113.236.69.149 attack
Automatic report - Port Scan Attack
2019-09-15 11:33:19
149.202.214.11 attackspam
v+ssh-bruteforce
2019-09-15 11:45:26
41.232.65.23 attackbotsspam
Chat Spam
2019-09-15 11:46:13
153.36.242.143 attackbotsspam
Sep 15 04:42:45 cvbmail sshd\[32443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143  user=root
Sep 15 04:42:47 cvbmail sshd\[32443\]: Failed password for root from 153.36.242.143 port 19774 ssh2
Sep 15 05:06:51 cvbmail sshd\[32522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143  user=root
2019-09-15 11:09:52
192.3.177.213 attack
Invalid user admin from 192.3.177.213 port 44090
2019-09-15 10:55:07
193.32.160.145 attackspam
SPAM Delivery Attempt
2019-09-15 11:13:28
50.236.62.30 attackspambots
$f2bV_matches
2019-09-15 10:58:11
142.93.212.131 attackbots
Sep 15 06:31:20 www sshd\[173090\]: Invalid user User from 142.93.212.131
Sep 15 06:31:20 www sshd\[173090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.131
Sep 15 06:31:22 www sshd\[173090\]: Failed password for invalid user User from 142.93.212.131 port 38240 ssh2
...
2019-09-15 11:32:08
120.52.121.86 attackbotsspam
2019-09-15T03:30:02.379313abusebot-5.cloudsearch.cf sshd\[20922\]: Invalid user buyer from 120.52.121.86 port 44177
2019-09-15 11:41:39
217.182.252.161 attackbotsspam
Sep 14 23:14:50 plusreed sshd[28167]: Invalid user mktg3 from 217.182.252.161
...
2019-09-15 11:15:55
193.169.0.225 attackspam
[portscan] Port scan
2019-09-15 11:13:01
159.203.201.61 attackspambots
159.203.201.61 - - \[15/Sep/2019:04:59:28 +0200\] "GET /manager/html HTTP/1.1" 400 264 "-" "Mozilla/5.0 zgrab/0.x"
...
2019-09-15 11:27:44
178.128.112.98 attack
Sep 15 04:01:56 XXX sshd[62324]: Invalid user ofsaa from 178.128.112.98 port 39166
2019-09-15 11:05:58

Recently Reported IPs

101.124.244.176 71.227.57.241 84.165.50.124 50.94.164.30
95.247.77.244 105.84.119.203 178.12.50.47 123.19.79.130
41.78.48.143 31.220.63.167 116.128.66.188 94.204.16.141
120.120.192.147 220.227.163.0 138.188.122.134 132.154.73.252
61.62.119.145 113.162.188.227 17.0.123.43 152.245.108.146