Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: China Mobile

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.139.29.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31837
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;211.139.29.195.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023031301 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 13 23:33:30 CST 2023
;; MSG SIZE  rcvd: 107
Host info
b'Host 195.29.139.211.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 195.29.139.211.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
95.81.76.195 attackbots
Jul 18 03:12:54 server6 sshd[30675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.81.76.195  user=r.r
Jul 18 03:12:55 server6 sshd[30675]: Failed password for r.r from 95.81.76.195 port 46111 ssh2
Jul 18 03:12:57 server6 sshd[30675]: Failed password for r.r from 95.81.76.195 port 46111 ssh2
Jul 18 03:12:59 server6 sshd[30675]: Failed password for r.r from 95.81.76.195 port 46111 ssh2
Jul 18 03:13:01 server6 sshd[30675]: Failed password for r.r from 95.81.76.195 port 46111 ssh2
Jul 18 03:13:04 server6 sshd[30675]: Failed password for r.r from 95.81.76.195 port 46111 ssh2
Jul 18 03:13:06 server6 sshd[30675]: Failed password for r.r from 95.81.76.195 port 46111 ssh2
Jul 18 03:13:06 server6 sshd[30675]: Disconnecting: Too many authentication failures for r.r from 95.81.76.195 port 46111 ssh2 [preauth]
Jul 18 03:13:06 server6 sshd[30675]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.81.76.195 ........
-------------------------------
2019-07-18 12:53:30
171.48.46.64 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-18 13:41:04
36.89.39.106 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-17 02:51:11,685 INFO [shellcode_manager] (36.89.39.106) no match, writing hexdump (424c19f2192a7529e283467a2c8423e8 :2243292) - MS17010 (EternalBlue)
2019-07-18 13:45:06
104.195.10.162 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2019-07-18 13:45:48
73.158.98.62 attackbots
Invalid user oracle from 73.158.98.62 port 39862
2019-07-18 13:29:54
157.230.254.143 attack
Jul 18 05:09:00 mail sshd\[28176\]: Invalid user rich from 157.230.254.143 port 38534
Jul 18 05:09:00 mail sshd\[28176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.254.143
Jul 18 05:09:02 mail sshd\[28176\]: Failed password for invalid user rich from 157.230.254.143 port 38534 ssh2
Jul 18 05:14:15 mail sshd\[28201\]: Invalid user admin from 157.230.254.143 port 36846
Jul 18 05:14:15 mail sshd\[28201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.254.143
...
2019-07-18 13:28:07
157.230.123.70 attack
Jul 18 07:04:55 mail sshd\[30227\]: Invalid user zimbra from 157.230.123.70 port 37572
Jul 18 07:04:55 mail sshd\[30227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.123.70
Jul 18 07:04:58 mail sshd\[30227\]: Failed password for invalid user zimbra from 157.230.123.70 port 37572 ssh2
Jul 18 07:09:31 mail sshd\[31095\]: Invalid user tod from 157.230.123.70 port 37836
Jul 18 07:09:31 mail sshd\[31095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.123.70
2019-07-18 13:26:04
112.133.244.185 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2019-07-18 13:41:37
14.242.150.246 attack
2019-07-17T21:15:57.164644stt-1.[munged] kernel: [7444176.538380] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:a8:41:08:00 SRC=14.242.150.246 DST=[mungedIP1] LEN=52 TOS=0x00 PREC=0x00 TTL=109 ID=12614 DF PROTO=TCP SPT=57445 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 
2019-07-17T21:15:58.179483stt-1.[munged] kernel: [7444177.553297] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:aa:c1:08:00 SRC=14.242.150.246 DST=[mungedIP1] LEN=52 TOS=0x00 PREC=0x00 TTL=109 ID=13333 DF PROTO=TCP SPT=57663 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0 
2019-07-17T21:23:31.598090stt-1.[munged] kernel: [7444630.970253] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:a8:41:08:00 SRC=14.242.150.246 DST=[mungedIP1] LEN=52 TOS=0x00 PREC=0x00 TTL=109 ID=19258 DF PROTO=TCP SPT=55591 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0
2019-07-18 12:48:06
54.36.108.162 attackbots
Automatic report - Banned IP Access
2019-07-18 12:50:05
51.91.18.121 attackbots
Jul 18 05:05:32 debian sshd\[6445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.18.121  user=root
Jul 18 05:05:34 debian sshd\[6445\]: Failed password for root from 51.91.18.121 port 55664 ssh2
...
2019-07-18 13:12:07
75.107.210.104 attack
Jul 18 03:13:18 vzhost sshd[2905]: Did not receive identification string from 75.107.210.104
Jul 18 03:17:16 vzhost sshd[3845]: Invalid user admin from 75.107.210.104
Jul 18 03:17:16 vzhost sshd[3845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.107.210.104 
Jul 18 03:17:19 vzhost sshd[3845]: Failed password for invalid user admin from 75.107.210.104 port 48346 ssh2
Jul 18 03:18:12 vzhost sshd[4046]: Invalid user ubuntu from 75.107.210.104
Jul 18 03:18:12 vzhost sshd[4046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.107.210.104 
Jul 18 03:18:14 vzhost sshd[4046]: Failed password for invalid user ubuntu from 75.107.210.104 port 48528 ssh2
Jul 18 03:19:37 vzhost sshd[4370]: Invalid user pi from 75.107.210.104
Jul 18 03:19:37 vzhost sshd[4370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.107.210.104 


........
-----------------------------------------------
https://www.bl
2019-07-18 12:59:56
104.248.65.180 attack
Jul 18 07:30:14 vps691689 sshd[29889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.65.180
Jul 18 07:30:16 vps691689 sshd[29889]: Failed password for invalid user ftpuser from 104.248.65.180 port 42324 ssh2
Jul 18 07:35:01 vps691689 sshd[29927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.65.180
...
2019-07-18 13:38:16
118.174.76.36 attack
445/tcp
[2019-07-18]1pkt
2019-07-18 13:46:37
177.94.222.22 attackbots
Automatic report - Port Scan Attack
2019-07-18 13:03:34

Recently Reported IPs

179.48.161.199 189.26.109.11 217.205.34.247 104.121.21.195
170.78.101.29 149.18.59.214 11.45.137.220 15.12.65.184
10.201.55.15 168.51.171.196 59.201.185.63 103.229.120.213
103.229.120.24 188.163.52.71 196.123.30.113 2001:470:883c:1b5b:da0c:d780:fe:1e7
187.250.44.180 65.20.216.155 180.76.243.230 199.148.29.145