Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.72.29.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56386
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.72.29.97.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 17:14:22 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 97.29.72.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 97.29.72.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
119.29.247.225 attack
Aug 20 06:08:26 lnxmail61 sshd[19082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.247.225
2019-08-20 15:55:20
111.75.149.221 attackspam
Try access to SMTP/POP/IMAP server.
2019-08-20 15:33:33
139.215.217.180 attackspam
Aug 19 21:34:07 lcdev sshd\[13652\]: Invalid user mellow from 139.215.217.180
Aug 19 21:34:07 lcdev sshd\[13652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.215.217.180
Aug 19 21:34:09 lcdev sshd\[13652\]: Failed password for invalid user mellow from 139.215.217.180 port 57265 ssh2
Aug 19 21:40:09 lcdev sshd\[14292\]: Invalid user bc from 139.215.217.180
Aug 19 21:40:09 lcdev sshd\[14292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.215.217.180
2019-08-20 15:46:02
106.13.9.75 attackspambots
Aug 20 09:16:06 plex sshd[5494]: Invalid user support from 106.13.9.75 port 37892
2019-08-20 15:39:51
121.122.45.221 attackspam
2019-08-20T07:36:14.938156abusebot-6.cloudsearch.cf sshd\[6457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.122.45.221  user=root
2019-08-20 15:38:42
147.135.195.254 attack
Aug 20 09:30:01 srv206 sshd[1399]: Invalid user planning from 147.135.195.254
...
2019-08-20 16:11:11
190.244.20.16 attack
$f2bV_matches
2019-08-20 16:04:48
174.138.20.132 attack
SSH/22 MH Probe, BF, Hack -
2019-08-20 16:12:37
175.165.176.138 attack
5500/tcp
[2019-08-20]1pkt
2019-08-20 15:54:45
150.107.0.34 attackbots
Aug 20 06:52:16 b2b-pharm sshd[13468]: Invalid user sinusbot1 from 150.107.0.34 port 38184
Aug 20 06:52:16 b2b-pharm sshd[13468]: error: maximum authentication attempts exceeded for invalid user sinusbot1 from 150.107.0.34 port 38184 ssh2 [preauth]
Aug 20 06:52:16 b2b-pharm sshd[13468]: Invalid user sinusbot1 from 150.107.0.34 port 38184
Aug 20 06:52:16 b2b-pharm sshd[13468]: error: maximum authentication attempts exceeded for invalid user sinusbot1 from 150.107.0.34 port 38184 ssh2 [preauth]
Aug 20 06:52:16 b2b-pharm sshd[13468]: Invalid user sinusbot1 from 150.107.0.34 port 38184
Aug 20 06:52:16 b2b-pharm sshd[13468]: error: maximum authentication attempts exceeded for invalid user sinusbot1 from 150.107.0.34 port 38184 ssh2 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=150.107.0.34
2019-08-20 15:38:11
208.102.113.11 attack
Aug 20 09:28:01 [host] sshd[32710]: Invalid user applmgr from 208.102.113.11
Aug 20 09:28:01 [host] sshd[32710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.102.113.11
Aug 20 09:28:03 [host] sshd[32710]: Failed password for invalid user applmgr from 208.102.113.11 port 39940 ssh2
2019-08-20 15:32:13
177.220.175.82 attackspam
Aug 20 09:21:05 * sshd[11221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.220.175.82
Aug 20 09:21:07 * sshd[11221]: Failed password for invalid user central from 177.220.175.82 port 11503 ssh2
2019-08-20 16:06:53
94.102.56.151 attackspambots
*Port Scan* detected from 94.102.56.151 (NL/Netherlands/no-reverse-dns-configured.com). 11 hits in the last 155 seconds
2019-08-20 16:14:28
119.18.159.6 attack
Automatic report - Banned IP Access
2019-08-20 15:25:11
85.73.7.98 attack
Automatic report - Port Scan Attack
2019-08-20 15:53:41

Recently Reported IPs

12.154.191.202 27.154.49.202 30.226.38.238 186.255.230.48
119.205.165.1 179.165.221.189 13.238.190.118 155.12.241.191
254.50.53.194 203.202.209.238 155.172.24.217 18.6.54.56
66.189.227.83 149.14.15.212 136.78.172.193 28.170.50.232
119.189.114.77 226.78.36.96 65.119.213.130 63.4.175.190