Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tver

Region: Tver Oblast

Country: Russia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.145.29.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47012
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.145.29.234.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020601 1800 900 604800 86400

;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 03:57:20 CST 2022
;; MSG SIZE  rcvd: 107
Host info
234.29.145.213.in-addr.arpa domain name pointer 213-145-29-234.bras.rtelekom.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
234.29.145.213.in-addr.arpa	name = 213-145-29-234.bras.rtelekom.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.65.245.203 attackspambots
SSH Brute Force, server-1 sshd[5245]: Failed password for invalid user ftpuser from 159.65.245.203 port 48658 ssh2
2019-07-01 17:14:02
113.161.1.111 attack
ssh failed login
2019-07-01 17:09:09
186.227.44.82 attack
Brute force attack to crack SMTP password (port 25 / 587)
2019-07-01 17:01:02
167.250.217.104 attack
failed_logins
2019-07-01 17:08:43
104.236.72.187 attack
detected by Fail2Ban
2019-07-01 16:54:44
194.190.92.10 attackbots
[portscan] Port scan
2019-07-01 17:29:55
118.97.147.26 attackbotsspam
Unauthorized connection attempt from IP address 118.97.147.26 on Port 445(SMB)
2019-07-01 17:41:19
80.232.251.114 attackspam
\[2019-07-01 03:02:01\] NOTICE\[5148\] chan_sip.c: Registration from '"90" \' failed for '80.232.251.114:5078' - Wrong password
\[2019-07-01 03:02:01\] SECURITY\[5156\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-01T03:02:01.370-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="90",SessionID="0x7f13a82dbdd8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/80.232.251.114/5078",Challenge="5264f654",ReceivedChallenge="5264f654",ReceivedHash="f2850afbd6ed734c54d98ea8b9039926"
\[2019-07-01 03:02:01\] NOTICE\[5148\] chan_sip.c: Registration from '"90" \' failed for '80.232.251.114:5078' - Wrong password
\[2019-07-01 03:02:01\] SECURITY\[5156\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-01T03:02:01.510-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="90",SessionID="0x7f13a8259b68",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/80.232.
2019-07-01 17:36:27
71.6.233.21 attackbotsspam
firewall-block, port(s): 8443/tcp
2019-07-01 17:04:13
89.238.167.57 attackspambots
10 attempts against mh-misc-ban on air.magehost.pro
2019-07-01 17:48:03
74.208.27.191 attackspam
Jul  1 07:50:22 cvbmail sshd\[5005\]: Invalid user kafka from 74.208.27.191
Jul  1 07:50:22 cvbmail sshd\[5005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.208.27.191
Jul  1 07:50:24 cvbmail sshd\[5005\]: Failed password for invalid user kafka from 74.208.27.191 port 35972 ssh2
2019-07-01 17:20:39
118.71.250.227 attackbotsspam
Portscanning on different or same port(s).
2019-07-01 17:36:05
186.179.81.81 attack
Many RDP login attempts detected by IDS script
2019-07-01 16:56:39
211.23.114.197 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-01 02:25:37,284 INFO [amun_request_handler] PortScan Detected on Port: 445 (211.23.114.197)
2019-07-01 17:22:46
205.185.115.123 attackspambots
Jul  1 06:38:01 work-partkepr sshd\[6249\]: Invalid user hadoop from 205.185.115.123 port 44856
Jul  1 06:38:01 work-partkepr sshd\[6249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.115.123
...
2019-07-01 17:05:13

Recently Reported IPs

54.228.55.240 103.55.25.130 11.227.47.199 152.250.11.227
252.8.13.15 210.131.220.239 185.63.253.24 157.171.4.46
185.63.253.219 185.63.253.184 23.166.198.28 86.172.1.12
161.230.112.229 63.0.15.38 28.5.70.2 5.38.209.2
21.74.20.98 5.32.203.4 29.130.25.117 216.29.104.132