Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.104.169.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38497
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;29.104.169.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 15:36:16 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 21.169.104.29.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.169.104.29.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
94.24.229.99 attackspambots
Honeypot attack, port: 445, PTR: pool-94-24-229-99is74.ru.
2020-02-10 14:46:30
186.139.218.8 attack
Feb 10 07:10:18 legacy sshd[15735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.139.218.8
Feb 10 07:10:20 legacy sshd[15735]: Failed password for invalid user lfr from 186.139.218.8 port 10102 ssh2
Feb 10 07:14:18 legacy sshd[15969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.139.218.8
...
2020-02-10 14:21:07
79.153.4.82 attack
DATE:2020-02-10 05:54:10, IP:79.153.4.82, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq)
2020-02-10 15:02:21
70.45.133.188 attack
Feb  9 21:11:48 mockhub sshd[17198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.45.133.188
Feb  9 21:11:50 mockhub sshd[17198]: Failed password for invalid user kje from 70.45.133.188 port 37318 ssh2
...
2020-02-10 14:31:35
62.234.154.56 attack
Automatic report - SSH Brute-Force Attack
2020-02-10 14:57:19
165.154.30.213 attackbotsspam
scan r
2020-02-10 14:54:23
201.235.245.61 attack
Feb  9 20:12:25 web9 sshd\[26498\]: Invalid user txo from 201.235.245.61
Feb  9 20:12:25 web9 sshd\[26498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.235.245.61
Feb  9 20:12:28 web9 sshd\[26498\]: Failed password for invalid user txo from 201.235.245.61 port 58186 ssh2
Feb  9 20:15:40 web9 sshd\[27026\]: Invalid user dkt from 201.235.245.61
Feb  9 20:15:40 web9 sshd\[27026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.235.245.61
2020-02-10 14:38:46
51.38.49.5 attackbotsspam
$f2bV_matches
2020-02-10 14:55:40
218.60.41.227 attack
Feb 10 06:25:22 srv-ubuntu-dev3 sshd[94237]: Invalid user fqs from 218.60.41.227
Feb 10 06:25:22 srv-ubuntu-dev3 sshd[94237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.60.41.227
Feb 10 06:25:22 srv-ubuntu-dev3 sshd[94237]: Invalid user fqs from 218.60.41.227
Feb 10 06:25:24 srv-ubuntu-dev3 sshd[94237]: Failed password for invalid user fqs from 218.60.41.227 port 48318 ssh2
Feb 10 06:34:30 srv-ubuntu-dev3 sshd[102274]: Invalid user bsl from 218.60.41.227
Feb 10 06:34:30 srv-ubuntu-dev3 sshd[102274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.60.41.227
Feb 10 06:34:30 srv-ubuntu-dev3 sshd[102274]: Invalid user bsl from 218.60.41.227
Feb 10 06:34:33 srv-ubuntu-dev3 sshd[102274]: Failed password for invalid user bsl from 218.60.41.227 port 50090 ssh2
...
2020-02-10 14:39:46
114.26.149.172 attackbots
20/2/10@00:17:02: FAIL: Alarm-Network address from=114.26.149.172
20/2/10@00:17:02: FAIL: Alarm-Network address from=114.26.149.172
...
2020-02-10 14:29:32
69.145.46.21 attack
Honeypot attack, port: 5555, PTR: host-69-145-46-21.shr-wy.client.bresnan.net.
2020-02-10 14:26:27
49.233.147.147 attackbotsspam
" "
2020-02-10 14:42:17
61.132.102.218 attackbotsspam
" "
2020-02-10 14:37:59
27.76.247.153 attackspambots
Honeypot attack, port: 81, PTR: localhost.
2020-02-10 14:40:38
112.169.152.105 attack
Feb 10 07:15:12 legacy sshd[16017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.169.152.105
Feb 10 07:15:14 legacy sshd[16017]: Failed password for invalid user gpq from 112.169.152.105 port 47338 ssh2
Feb 10 07:18:31 legacy sshd[16192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.169.152.105
...
2020-02-10 14:23:27

Recently Reported IPs

98.244.240.62 80.145.13.180 245.161.18.220 19.90.200.46
80.20.239.0 20.217.148.222 185.210.56.30 22.212.117.177
202.247.105.84 202.17.83.193 116.203.80.94 35.75.129.30
156.253.62.195 48.216.24.106 216.105.189.9 159.91.102.100
91.193.136.92 237.131.182.244 77.113.41.15 96.67.220.196