Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 247.142.61.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21905
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;247.142.61.29.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 03:28:47 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 29.61.142.247.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 29.61.142.247.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.59.32.156 attackbotsspam
SSH login attempts.
2020-05-25 18:26:36
176.31.217.184 attack
May 25 07:26:57 ns381471 sshd[2318]: Failed password for root from 176.31.217.184 port 38398 ssh2
2020-05-25 18:17:38
178.128.217.135 attackbotsspam
May 25 12:38:46 hosting sshd[4486]: Invalid user pasparoot1111111111 from 178.128.217.135 port 37502
...
2020-05-25 18:06:43
103.243.252.244 attackspambots
Invalid user prueba from 103.243.252.244 port 54010
2020-05-25 18:21:35
192.241.246.50 attackbotsspam
Fail2Ban Ban Triggered
2020-05-25 18:02:01
37.187.5.137 attack
May 25 05:25:21 ns382633 sshd\[17945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.5.137  user=root
May 25 05:25:23 ns382633 sshd\[17945\]: Failed password for root from 37.187.5.137 port 52604 ssh2
May 25 05:40:50 ns382633 sshd\[21193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.5.137  user=root
May 25 05:40:53 ns382633 sshd\[21193\]: Failed password for root from 37.187.5.137 port 34328 ssh2
May 25 05:47:29 ns382633 sshd\[22247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.5.137  user=root
2020-05-25 18:36:29
106.13.11.238 attackspam
May 25 05:40:26 mail sshd[10828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.11.238  user=root
May 25 05:40:28 mail sshd[10828]: Failed password for root from 106.13.11.238 port 60604 ssh2
May 25 05:48:16 mail sshd[11788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.11.238  user=root
May 25 05:48:18 mail sshd[11788]: Failed password for root from 106.13.11.238 port 42578 ssh2
...
2020-05-25 18:01:23
14.253.152.22 attackbotsspam
1590378443 - 05/25/2020 05:47:23 Host: 14.253.152.22/14.253.152.22 Port: 445 TCP Blocked
2020-05-25 18:41:38
142.93.56.12 attackbotsspam
2020-05-25T12:37:53.588217afi-git.jinr.ru sshd[28225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.56.12
2020-05-25T12:37:53.584820afi-git.jinr.ru sshd[28225]: Invalid user 101 from 142.93.56.12 port 53126
2020-05-25T12:37:55.767875afi-git.jinr.ru sshd[28225]: Failed password for invalid user 101 from 142.93.56.12 port 53126 ssh2
2020-05-25T12:41:42.722750afi-git.jinr.ru sshd[29158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.56.12  user=root
2020-05-25T12:41:44.340238afi-git.jinr.ru sshd[29158]: Failed password for root from 142.93.56.12 port 37880 ssh2
...
2020-05-25 18:00:05
189.182.197.150 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-05-25 18:13:45
179.217.0.66 attackbotsspam
"Unauthorized connection attempt on SSHD detected"
2020-05-25 18:02:23
87.251.74.210 attack
May 25 11:41:45 debian-2gb-nbg1-2 kernel: \[12658509.174971\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.210 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=43162 PROTO=TCP SPT=44254 DPT=1643 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-25 18:21:53
103.63.109.32 attack
Auto reported by IDS
2020-05-25 18:36:58
188.246.224.140 attackspambots
May 25 09:42:24 mail sshd[29143]: Failed password for root from 188.246.224.140 port 53494 ssh2
May 25 09:48:37 mail sshd[1004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.246.224.140 
...
2020-05-25 18:40:33
31.40.27.254 attackbots
<6 unauthorized SSH connections
2020-05-25 18:21:05

Recently Reported IPs

44.58.42.167 222.14.187.38 16.169.169.202 165.6.178.42
125.232.98.154 169.13.173.44 17.223.215.24 138.118.19.84
164.122.18.152 157.5.250.102 28.106.87.201 101.114.52.45
57.105.130.129 224.237.118.119 50.111.194.46 44.138.11.107
143.5.204.34 51.25.129.150 47.130.204.244 67.159.132.6