Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.129.122.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30574
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.129.122.29.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011001 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 11 10:20:41 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 29.122.129.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 29.122.129.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.48.84.6 attackbots
Nov 20 08:31:31 sd-53420 sshd\[30718\]: User root from 182.48.84.6 not allowed because none of user's groups are listed in AllowGroups
Nov 20 08:31:31 sd-53420 sshd\[30718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.48.84.6  user=root
Nov 20 08:31:32 sd-53420 sshd\[30718\]: Failed password for invalid user root from 182.48.84.6 port 48432 ssh2
Nov 20 08:36:44 sd-53420 sshd\[32286\]: User mysql from 182.48.84.6 not allowed because none of user's groups are listed in AllowGroups
Nov 20 08:36:44 sd-53420 sshd\[32286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.48.84.6  user=mysql
...
2019-11-20 16:50:36
222.186.169.194 attack
Nov 20 09:52:17 MK-Soft-VM5 sshd[17619]: Failed password for root from 222.186.169.194 port 63782 ssh2
Nov 20 09:52:21 MK-Soft-VM5 sshd[17619]: Failed password for root from 222.186.169.194 port 63782 ssh2
...
2019-11-20 16:54:50
222.186.180.223 attackspam
Nov 20 09:52:31 vmanager6029 sshd\[23388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223  user=root
Nov 20 09:52:34 vmanager6029 sshd\[23388\]: Failed password for root from 222.186.180.223 port 3774 ssh2
Nov 20 09:52:37 vmanager6029 sshd\[23388\]: Failed password for root from 222.186.180.223 port 3774 ssh2
2019-11-20 16:55:45
123.16.147.6 attackspam
2019-11-20T07:29:03.2212561240 sshd\[9233\]: Invalid user admin from 123.16.147.6 port 47863
2019-11-20T07:29:03.2236901240 sshd\[9233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.16.147.6
2019-11-20T07:29:05.0816091240 sshd\[9233\]: Failed password for invalid user admin from 123.16.147.6 port 47863 ssh2
...
2019-11-20 16:23:57
185.143.223.146 attack
Scanning random ports - tries to find possible vulnerable services
2019-11-20 17:03:09
207.180.228.157 attackbots
Nov 19 19:12:21 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 207.180.228.157 port 59365 ssh2 (target: 192.99.147.166:22, password: r.r)
Nov 19 19:12:29 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 207.180.228.157 port 37981 ssh2 (target: 192.99.147.166:22, password: r.r123456)
Nov 19 19:12:39 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 207.180.228.157 port 44831 ssh2 (target: 192.99.147.166:22, password: QAZ2WSX)
Nov 19 19:12:47 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 207.180.228.157 port 51682 ssh2 (target: 192.99.147.166:22, password: qaz2WSX)
Nov 19 19:12:57 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 207.180.228.157 port 58537 ssh2 (target: 192.99.147.166:22, password: !QAZ2wsx)
Nov 19 19:13:06 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 207.180.228.157 port 37151 ssh2 (target: 192.99.147.166:22, password: !qaz2wsx)
Nov 19 19:13:15 wildwolf ssh-honeypotd[26164]: Failed p........
------------------------------
2019-11-20 16:37:10
218.60.41.227 attack
$f2bV_matches
2019-11-20 16:39:23
181.115.108.86 attackbotsspam
2019-11-20 06:21:06 H=([181.115.108.86]) [181.115.108.86]:54983 I=[10.100.18.23]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=181.115.108.86)
2019-11-20 06:21:06 unexpected disconnection while reading SMTP command from ([181.115.108.86]) [181.115.108.86]:54983 I=[10.100.18.23]:25 (error: Connection reset by peer)
2019-11-20 07:21:46 H=([181.115.108.86]) [181.115.108.86]:35315 I=[10.100.18.23]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=181.115.108.86)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=181.115.108.86
2019-11-20 16:38:52
129.213.172.170 attackbotsspam
Nov 19 22:43:44 hanapaa sshd\[29527\]: Invalid user seascape12 from 129.213.172.170
Nov 19 22:43:44 hanapaa sshd\[29527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.172.170
Nov 19 22:43:46 hanapaa sshd\[29527\]: Failed password for invalid user seascape12 from 129.213.172.170 port 39939 ssh2
Nov 19 22:53:42 hanapaa sshd\[30334\]: Invalid user Motdepasse!234 from 129.213.172.170
Nov 19 22:53:42 hanapaa sshd\[30334\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.172.170
2019-11-20 16:56:01
222.174.122.115 attack
Connection by 222.174.122.115 on port: 23 got caught by honeypot at 11/20/2019 7:04:16 AM
2019-11-20 16:59:47
1.119.166.2 attackspambots
port scan and connect, tcp 1433 (ms-sql-s)
2019-11-20 17:01:05
120.211.2.71 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2019-11-20 17:00:36
114.5.81.67 attack
IP attempted unauthorised action
2019-11-20 16:56:19
45.143.220.33 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-20 17:02:41
183.129.141.44 attackbots
Nov 20 06:00:54 linuxrulz sshd[6398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.129.141.44  user=r.r
Nov 20 06:00:57 linuxrulz sshd[6398]: Failed password for r.r from 183.129.141.44 port 56600 ssh2
Nov 20 06:00:57 linuxrulz sshd[6398]: Received disconnect from 183.129.141.44 port 56600:11: Bye Bye [preauth]
Nov 20 06:00:57 linuxrulz sshd[6398]: Disconnected from 183.129.141.44 port 56600 [preauth]
Nov 20 06:20:48 linuxrulz sshd[9133]: Invalid user vcsa from 183.129.141.44 port 52394
Nov 20 06:20:48 linuxrulz sshd[9133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.129.141.44
Nov 20 06:20:49 linuxrulz sshd[9133]: Failed password for invalid user vcsa from 183.129.141.44 port 52394 ssh2
Nov 20 06:20:50 linuxrulz sshd[9133]: Received disconnect from 183.129.141.44 port 52394:11: Bye Bye [preauth]
Nov 20 06:20:50 linuxrulz sshd[9133]: Disconnected from 183.129.141.44 port 52394........
-------------------------------
2019-11-20 16:44:01

Recently Reported IPs

173.134.119.4 209.198.44.10 185.240.162.95 207.60.247.31
202.118.27.180 186.69.120.243 25.98.238.206 253.235.157.77
70.194.207.139 73.203.3.244 68.171.122.233 185.79.102.48
163.105.95.140 143.230.31.214 82.50.89.125 7.28.221.19
219.123.106.47 25.31.105.154 91.25.175.139 56.11.110.131