Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Oslo

Region: Oslo County

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: Tele Danmark

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.188.29.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26892
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.188.29.207.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042701 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Apr 27 22:55:12 +08 2019
;; MSG SIZE  rcvd: 118

Host info
Host 207.29.188.213.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 207.29.188.213.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
59.115.58.112 attackbotsspam
Unauthorized connection attempt from IP address 59.115.58.112 on Port 445(SMB)
2020-05-31 05:22:08
112.85.42.188 attackspam
05/30/2020-17:10:21.024959 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-05-31 05:10:47
123.148.244.246 attack
Attack, like DDOS, Brute-Force, Port Scan, Hack, etc.
2020-05-31 05:40:38
185.82.127.31 attack
5x Failed Password
2020-05-31 05:18:18
209.141.37.175 attack
2020-05-30T21:07:06.229677abusebot-6.cloudsearch.cf sshd[25651]: Invalid user fake from 209.141.37.175 port 52808
2020-05-30T21:07:06.239027abusebot-6.cloudsearch.cf sshd[25651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.37.175
2020-05-30T21:07:06.229677abusebot-6.cloudsearch.cf sshd[25651]: Invalid user fake from 209.141.37.175 port 52808
2020-05-30T21:07:08.541408abusebot-6.cloudsearch.cf sshd[25651]: Failed password for invalid user fake from 209.141.37.175 port 52808 ssh2
2020-05-30T21:07:09.039195abusebot-6.cloudsearch.cf sshd[25655]: Invalid user ubnt from 209.141.37.175 port 57438
2020-05-30T21:07:09.045918abusebot-6.cloudsearch.cf sshd[25655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.37.175
2020-05-30T21:07:09.039195abusebot-6.cloudsearch.cf sshd[25655]: Invalid user ubnt from 209.141.37.175 port 57438
2020-05-30T21:07:11.092484abusebot-6.cloudsearch.cf sshd[25655]: Fail
...
2020-05-31 05:37:54
222.186.31.83 attackbots
May 30 23:11:33 v22018053744266470 sshd[29420]: Failed password for root from 222.186.31.83 port 58338 ssh2
May 30 23:11:40 v22018053744266470 sshd[29431]: Failed password for root from 222.186.31.83 port 34240 ssh2
...
2020-05-31 05:15:03
177.87.230.97 attackbots
Unauthorized connection attempt from IP address 177.87.230.97 on Port 445(SMB)
2020-05-31 05:30:55
106.13.124.76 attackbots
May 30 21:39:23 sigma sshd\[16772\]: Invalid user console from 106.13.124.76May 30 21:39:24 sigma sshd\[16772\]: Failed password for invalid user console from 106.13.124.76 port 43324 ssh2
...
2020-05-31 05:26:31
89.252.191.174 attackbots
Unauthorized connection attempt from IP address 89.252.191.174 on Port 445(SMB)
2020-05-31 05:21:54
222.186.3.249 attackbotsspam
May 30 23:12:00 OPSO sshd\[8145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.3.249  user=root
May 30 23:12:02 OPSO sshd\[8145\]: Failed password for root from 222.186.3.249 port 17229 ssh2
May 30 23:12:04 OPSO sshd\[8145\]: Failed password for root from 222.186.3.249 port 17229 ssh2
May 30 23:12:06 OPSO sshd\[8145\]: Failed password for root from 222.186.3.249 port 17229 ssh2
May 30 23:15:15 OPSO sshd\[8870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.3.249  user=root
2020-05-31 05:24:10
51.255.150.119 attackbotsspam
"Unauthorized connection attempt on SSHD detected"
2020-05-31 05:38:54
79.137.181.54 attackspam
Unauthorized connection attempt from IP address 79.137.181.54 on Port 445(SMB)
2020-05-31 05:34:55
144.140.136.147 attackspambots
Unauthorized connection attempt from IP address 144.140.136.147 on Port 445(SMB)
2020-05-31 05:18:32
222.186.175.167 attackbotsspam
web-1 [ssh] SSH Attack
2020-05-31 05:28:25
101.91.238.160 attackbotsspam
2020-05-30T14:41:31.697418linuxbox-skyline sshd[31147]: Invalid user djones from 101.91.238.160 port 54026
...
2020-05-31 05:04:14

Recently Reported IPs

117.5.208.42 107.192.155.9 121.20.46.53 125.167.147.214
124.94.25.143 179.104.239.29 213.48.243.7 131.86.44.105
54.167.154.62 65.147.65.52 67.225.191.130 121.254.153.165
153.173.166.44 77.53.93.64 138.16.158.237 166.103.54.251
183.89.208.189 75.5.15.22 156.208.172.244 107.220.174.121