Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Taichung

Region: Taichung City

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: Data Communication Business Group

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
220.134.29.101 attackspam
Honeypot attack, port: 81, PTR: 220-134-29-101.HINET-IP.hinet.net.
2020-03-24 16:37:50
220.134.29.165 attack
Unauthorized connection attempt detected from IP address 220.134.29.165 to port 23 [J]
2020-03-01 06:22:20
220.134.29.180 attackspambots
Unauthorized connection attempt detected from IP address 220.134.29.180 to port 81 [J]
2020-03-01 00:04:32
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.134.29.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28336
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;220.134.29.59.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061900 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 19 16:05:28 CST 2019
;; MSG SIZE  rcvd: 117
Host info
59.29.134.220.in-addr.arpa domain name pointer 220-134-29-59.HINET-IP.hinet.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
59.29.134.220.in-addr.arpa	name = 220-134-29-59.HINET-IP.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.212 attack
Jun 13 12:12:38 legacy sshd[14298]: Failed password for root from 218.92.0.212 port 26039 ssh2
Jun 13 12:12:52 legacy sshd[14298]: error: maximum authentication attempts exceeded for root from 218.92.0.212 port 26039 ssh2 [preauth]
Jun 13 12:13:05 legacy sshd[14307]: Failed password for root from 218.92.0.212 port 58302 ssh2
...
2020-06-13 18:34:38
181.129.165.139 attackbots
Auto Fail2Ban report, multiple SSH login attempts.
2020-06-13 18:25:12
95.85.38.127 attackspam
Invalid user ruby from 95.85.38.127 port 51402
2020-06-13 18:33:42
177.126.25.59 attack
Invalid user ubnt from 177.126.25.59 port 45396
2020-06-13 18:21:37
49.232.48.129 attack
Invalid user temp from 49.232.48.129 port 39238
2020-06-13 18:31:02
159.65.41.104 attackbotsspam
sshd: Failed password for invalid user .... from 159.65.41.104 port 35826 ssh2 (6 attempts)
2020-06-13 18:49:04
159.65.155.255 attackbotsspam
Jun 13 11:45:17 sip sshd[632523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.155.255 
Jun 13 11:45:17 sip sshd[632523]: Invalid user gauri from 159.65.155.255 port 42410
Jun 13 11:45:19 sip sshd[632523]: Failed password for invalid user gauri from 159.65.155.255 port 42410 ssh2
...
2020-06-13 18:38:39
54.36.110.223 attack
1 attempts against mh-modsecurity-ban on crop
2020-06-13 18:20:34
49.88.112.88 attack
Jun 13 11:14:34 rocket sshd[20518]: Failed password for root from 49.88.112.88 port 44948 ssh2
Jun 13 11:14:44 rocket sshd[20525]: Failed password for root from 49.88.112.88 port 42628 ssh2
...
2020-06-13 18:26:35
88.155.141.118 attackspam
[portscan] Port scan
2020-06-13 18:45:52
164.132.42.32 attack
Jun 13 13:37:38 pkdns2 sshd\[24183\]: Invalid user ejg from 164.132.42.32Jun 13 13:37:40 pkdns2 sshd\[24183\]: Failed password for invalid user ejg from 164.132.42.32 port 48416 ssh2Jun 13 13:40:15 pkdns2 sshd\[24346\]: Invalid user gwv from 164.132.42.32Jun 13 13:40:16 pkdns2 sshd\[24346\]: Failed password for invalid user gwv from 164.132.42.32 port 33756 ssh2Jun 13 13:42:43 pkdns2 sshd\[24452\]: Failed password for root from 164.132.42.32 port 47330 ssh2Jun 13 13:45:12 pkdns2 sshd\[24623\]: Failed password for root from 164.132.42.32 port 60904 ssh2
...
2020-06-13 18:54:47
106.75.130.166 attackspam
Invalid user seedbox from 106.75.130.166 port 48374
2020-06-13 18:54:34
104.45.194.130 attack
h
2020-06-13 18:23:41
178.62.214.85 attack
ssh brute force
2020-06-13 18:36:28
185.58.226.235 attackbots
Wordpress malicious attack:[sshd]
2020-06-13 18:44:12

Recently Reported IPs

139.118.46.202 60.180.1.79 57.170.184.166 109.198.171.45
185.74.173.248 137.61.192.106 89.228.147.8 92.53.90.198
156.162.96.213 89.255.40.182 75.210.103.52 197.188.149.56
41.165.30.6 93.51.59.191 195.242.233.114 196.162.212.215
132.64.78.230 85.192.5.154 175.22.89.152 186.16.202.40