Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.246.29.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22581
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;218.246.29.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 08:28:14 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 149.29.246.218.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.29.246.218.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
144.76.176.171 attackspam
20 attempts against mh-misbehave-ban on storm
2020-05-14 17:25:28
116.100.33.9 attack
port scan and connect, tcp 81 (hosts2-ns)
2020-05-14 16:58:43
31.202.101.40 attackspambots
WP bruteforce attempt; username: N/A
2020-05-14 17:13:47
81.182.246.50 attack
05/13/2020-23:48:53.695420 81.182.246.50 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 83
2020-05-14 17:03:37
118.24.83.41 attackbots
(sshd) Failed SSH login from 118.24.83.41 (CN/China/-): 5 in the last 3600 secs
2020-05-14 17:29:49
110.78.171.42 attack
Hits on port : 82
2020-05-14 16:53:54
196.52.43.52 attackbotsspam
 TCP (SYN) 196.52.43.52:57916 -> port 8080, len 44
2020-05-14 17:27:02
220.133.252.119 attackbotsspam
port 23
2020-05-14 17:20:39
139.199.30.155 attackspambots
May 14 08:53:55 lukav-desktop sshd\[17285\]: Invalid user popuser from 139.199.30.155
May 14 08:53:55 lukav-desktop sshd\[17285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.30.155
May 14 08:53:57 lukav-desktop sshd\[17285\]: Failed password for invalid user popuser from 139.199.30.155 port 58822 ssh2
May 14 08:55:57 lukav-desktop sshd\[17308\]: Invalid user user from 139.199.30.155
May 14 08:55:57 lukav-desktop sshd\[17308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.30.155
2020-05-14 16:58:13
41.60.238.48 attack
Hits on port : 8080
2020-05-14 16:55:48
14.18.118.44 attack
Invalid user deploy from 14.18.118.44 port 34822
2020-05-14 17:31:53
193.70.13.14 attackspam
spams web forms
2020-05-14 17:06:26
220.165.15.228 attackbotsspam
Invalid user uriel from 220.165.15.228 port 47586
2020-05-14 16:56:41
162.243.138.27 attackbots
 TCP (SYN) 162.243.138.27:46656 -> port 465, len 44
2020-05-14 17:34:08
143.255.8.2 attackspam
May 14 14:53:10 NG-HHDC-SVS-001 sshd[30732]: Invalid user opscode from 143.255.8.2
...
2020-05-14 17:32:55

Recently Reported IPs

180.245.51.82 143.138.150.169 42.248.51.132 5.88.51.100
109.243.230.84 30.144.177.200 15.49.120.210 235.107.5.168
209.162.67.48 167.133.7.99 227.225.43.107 135.221.122.177
69.229.157.149 50.150.170.226 90.65.147.209 241.105.93.133
101.155.28.60 63.222.150.86 61.131.67.120 47.164.117.238