Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.29.31.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59456
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.29.31.8.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 13:02:54 CST 2025
;; MSG SIZE  rcvd: 104
Host info
8.31.29.212.in-addr.arpa domain name pointer host-008-031-029-212.customer.teamware-gmbh.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.31.29.212.in-addr.arpa	name = host-008-031-029-212.customer.teamware-gmbh.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.183.235.124 attack
1598876881 - 08/31/2020 14:28:01 Host: 14.183.235.124/14.183.235.124 Port: 445 TCP Blocked
...
2020-09-01 04:55:23
37.59.43.63 attack
Invalid user sdtdserver from 37.59.43.63 port 49614
2020-09-01 05:11:41
112.85.42.194 attackbotsspam
Aug 31 23:36:33 ift sshd\[3836\]: Failed password for root from 112.85.42.194 port 21274 ssh2Aug 31 23:37:40 ift sshd\[4042\]: Failed password for root from 112.85.42.194 port 64353 ssh2Aug 31 23:37:42 ift sshd\[4042\]: Failed password for root from 112.85.42.194 port 64353 ssh2Aug 31 23:37:45 ift sshd\[4042\]: Failed password for root from 112.85.42.194 port 64353 ssh2Aug 31 23:40:02 ift sshd\[4311\]: Failed password for root from 112.85.42.194 port 39331 ssh2
...
2020-09-01 04:48:31
31.28.8.163 attackbots
Invalid user ubnt from 31.28.8.163 port 40344
2020-09-01 04:43:34
72.9.63.246 attackbotsspam
Unauthorised access (Aug 31) SRC=72.9.63.246 LEN=40 TOS=0x08 PREC=0x20 TTL=45 ID=49357 TCP DPT=8080 WINDOW=35939 SYN 
Unauthorised access (Aug 30) SRC=72.9.63.246 LEN=40 TOS=0x08 PREC=0x20 TTL=45 ID=40295 TCP DPT=8080 WINDOW=47214 SYN
2020-09-01 04:54:07
89.46.79.227 attackbots
Aug 31 19:21:42 itv-usvr-02 sshd[10973]: Invalid user usuario from 89.46.79.227 port 52642
Aug 31 19:21:42 itv-usvr-02 sshd[10973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.46.79.227
Aug 31 19:21:42 itv-usvr-02 sshd[10973]: Invalid user usuario from 89.46.79.227 port 52642
Aug 31 19:21:44 itv-usvr-02 sshd[10973]: Failed password for invalid user usuario from 89.46.79.227 port 52642 ssh2
Aug 31 19:27:29 itv-usvr-02 sshd[11164]: Invalid user ten from 89.46.79.227 port 54302
2020-09-01 05:09:07
181.48.126.186 attackspambots
1598876898 - 08/31/2020 14:28:18 Host: 181.48.126.186/181.48.126.186 Port: 445 TCP Blocked
2020-09-01 04:44:32
159.242.42.6 attack
2020-08-31T23:14:06.880941h2857900.stratoserver.net sshd[23697]: Invalid user admin from 159.242.42.6 port 46814
2020-08-31T23:14:08.051309h2857900.stratoserver.net sshd[23699]: Invalid user admin from 159.242.42.6 port 46855
...
2020-09-01 05:16:53
142.93.99.56 attackspam
142.93.99.56 - - [31/Aug/2020:14:01:20 +0200] "POST /xmlrpc.php HTTP/1.1" 403 13511 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.99.56 - - [31/Aug/2020:14:27:59 +0200] "POST /xmlrpc.php HTTP/1.1" 403 8487 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-01 04:56:20
181.48.138.242 attack
Aug 31 23:10:48 inter-technics sshd[12220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.138.242  user=root
Aug 31 23:10:50 inter-technics sshd[12220]: Failed password for root from 181.48.138.242 port 41402 ssh2
Aug 31 23:14:44 inter-technics sshd[12386]: Invalid user bruno from 181.48.138.242 port 45306
Aug 31 23:14:44 inter-technics sshd[12386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.138.242
Aug 31 23:14:44 inter-technics sshd[12386]: Invalid user bruno from 181.48.138.242 port 45306
Aug 31 23:14:46 inter-technics sshd[12386]: Failed password for invalid user bruno from 181.48.138.242 port 45306 ssh2
...
2020-09-01 05:21:01
115.236.67.42 attackspam
Invalid user thor from 115.236.67.42 port 7097
2020-09-01 04:58:13
83.234.176.99 attackspambots
20/8/31@08:27:22: FAIL: Alarm-Network address from=83.234.176.99
20/8/31@08:27:22: FAIL: Alarm-Network address from=83.234.176.99
...
2020-09-01 05:12:46
193.95.115.134 attackbots
xmlrpc attack
2020-09-01 05:06:54
113.141.64.146 attack
Unauthorised access (Aug 31) SRC=113.141.64.146 LEN=40 TTL=241 ID=45869 TCP DPT=1433 WINDOW=1024 SYN
2020-09-01 04:55:06
223.223.187.2 attack
Sep  1 07:14:06 NG-HHDC-SVS-001 sshd[6542]: Invalid user lv from 223.223.187.2
...
2020-09-01 05:16:31

Recently Reported IPs

238.53.156.201 211.93.127.183 49.95.253.12 117.214.213.11
250.3.86.206 141.66.121.129 249.213.64.51 109.229.115.13
196.252.124.180 241.233.238.55 180.115.208.145 206.18.228.157
26.97.125.105 120.127.255.246 190.76.96.133 137.33.223.30
15.191.186.78 85.232.39.179 56.64.48.232 54.21.15.138