Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 241.29.157.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24887
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;241.29.157.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010602 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 07 12:34:14 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 12.157.29.241.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.157.29.241.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.230.112.50 attackbots
Sep 24 03:10:53 xtremcommunity sshd\[421762\]: Invalid user smolik from 37.230.112.50 port 37870
Sep 24 03:10:53 xtremcommunity sshd\[421762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.230.112.50
Sep 24 03:10:55 xtremcommunity sshd\[421762\]: Failed password for invalid user smolik from 37.230.112.50 port 37870 ssh2
Sep 24 03:15:10 xtremcommunity sshd\[421869\]: Invalid user debug from 37.230.112.50 port 37448
Sep 24 03:15:10 xtremcommunity sshd\[421869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.230.112.50
...
2019-09-24 15:25:40
222.186.31.145 attack
Sep 24 01:58:08 aat-srv002 sshd[3871]: Failed password for root from 222.186.31.145 port 43129 ssh2
Sep 24 01:58:10 aat-srv002 sshd[3871]: Failed password for root from 222.186.31.145 port 43129 ssh2
Sep 24 01:58:12 aat-srv002 sshd[3871]: Failed password for root from 222.186.31.145 port 43129 ssh2
Sep 24 02:03:14 aat-srv002 sshd[4008]: Failed password for root from 222.186.31.145 port 49703 ssh2
...
2019-09-24 15:08:54
1.54.239.6 attack
Unauthorised access (Sep 24) SRC=1.54.239.6 LEN=40 TTL=47 ID=30419 TCP DPT=8080 WINDOW=3809 SYN 
Unauthorised access (Sep 24) SRC=1.54.239.6 LEN=40 TTL=47 ID=10851 TCP DPT=8080 WINDOW=3809 SYN 
Unauthorised access (Sep 23) SRC=1.54.239.6 LEN=40 TTL=47 ID=61721 TCP DPT=8080 WINDOW=52256 SYN
2019-09-24 15:26:13
123.207.96.242 attack
Sep 24 07:33:19 monocul sshd[20471]: Invalid user admin from 123.207.96.242 port 51771
...
2019-09-24 15:42:18
202.129.29.135 attack
Sep 24 09:22:07 OPSO sshd\[13118\]: Invalid user teste from 202.129.29.135 port 47493
Sep 24 09:22:07 OPSO sshd\[13118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.129.29.135
Sep 24 09:22:09 OPSO sshd\[13118\]: Failed password for invalid user teste from 202.129.29.135 port 47493 ssh2
Sep 24 09:27:13 OPSO sshd\[14111\]: Invalid user jq from 202.129.29.135 port 39408
Sep 24 09:27:13 OPSO sshd\[14111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.129.29.135
2019-09-24 15:36:36
222.186.180.8 attackspambots
Sep 24 03:36:26 plusreed sshd[28479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8  user=root
Sep 24 03:36:28 plusreed sshd[28479]: Failed password for root from 222.186.180.8 port 31856 ssh2
...
2019-09-24 15:40:15
123.55.87.213 attackbotsspam
Sep 24 06:33:00 venus sshd\[702\]: Invalid user ha from 123.55.87.213 port 12128
Sep 24 06:33:00 venus sshd\[702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.55.87.213
Sep 24 06:33:02 venus sshd\[702\]: Failed password for invalid user ha from 123.55.87.213 port 12128 ssh2
...
2019-09-24 15:42:38
77.247.181.162 attackspam
2019-09-24T07:32:07.186450abusebot.cloudsearch.cf sshd\[31434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=chomsky.torservers.net  user=root
2019-09-24 15:34:28
92.62.139.103 attack
2019-09-24T06:17:53.715799abusebot.cloudsearch.cf sshd\[30077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.62.139.103  user=root
2019-09-24 15:17:53
96.48.244.48 attack
Sep 24 03:54:56 localhost sshd\[16623\]: Invalid user ky from 96.48.244.48 port 46022
Sep 24 03:54:56 localhost sshd\[16623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.48.244.48
Sep 24 03:54:58 localhost sshd\[16623\]: Failed password for invalid user ky from 96.48.244.48 port 46022 ssh2
...
2019-09-24 15:02:48
58.87.67.142 attackbots
Sep 24 00:20:21 ny01 sshd[25113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.67.142
Sep 24 00:20:23 ny01 sshd[25113]: Failed password for invalid user cssserver from 58.87.67.142 port 35516 ssh2
Sep 24 00:25:41 ny01 sshd[26541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.67.142
2019-09-24 15:13:35
62.48.150.175 attack
Sep 24 08:50:11 core sshd[14964]: Failed password for sync from 62.48.150.175 port 59334 ssh2
Sep 24 08:54:50 core sshd[20737]: Invalid user kravi from 62.48.150.175 port 46804
...
2019-09-24 15:21:12
200.24.80.2 attackspam
postfix
2019-09-24 15:43:44
222.102.43.234 attackbotsspam
2019-09-24 15:45:38
159.65.12.204 attack
SSH Brute Force, server-1 sshd[2800]: Failed password for invalid user webmail from 159.65.12.204 port 47824 ssh2
2019-09-24 15:10:28

Recently Reported IPs

86.81.176.7 63.252.206.39 7.99.251.117 180.186.235.142
188.250.75.78 221.99.238.111 171.212.196.194 255.180.176.57
77.209.177.218 69.252.74.174 210.121.63.167 184.174.147.236
101.37.240.161 114.53.30.20 215.111.106.74 44.199.99.23
249.199.176.109 215.242.12.90 250.29.12.200 252.229.177.234