Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.113.145.160
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52937
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;29.113.145.160.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 20:15:00 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 160.145.113.29.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 160.145.113.29.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.97.128.83 attack
Sep 12 18:55:15 pipo sshd[2899]: Disconnected from authenticating user gnats 118.97.128.83 port 55623 [preauth]
Sep 12 18:55:54 pipo sshd[3788]: Disconnected from authenticating user root 118.97.128.83 port 59104 [preauth]
Sep 12 18:56:32 pipo sshd[5222]: Invalid user if from 118.97.128.83 port 34356
Sep 12 18:56:33 pipo sshd[5222]: Disconnected from invalid user if 118.97.128.83 port 34356 [preauth]
...
2020-09-13 23:03:19
194.26.25.119 attackspambots
Excessive Port-Scanning
2020-09-13 22:25:54
95.152.24.115 attackspam
2020-09-12T16:55:18.042210upcloud.m0sh1x2.com sshd[5478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-95-152-24-115.dsl.sura.ru  user=root
2020-09-12T16:55:20.601217upcloud.m0sh1x2.com sshd[5478]: Failed password for root from 95.152.24.115 port 49113 ssh2
2020-09-13 23:07:32
167.114.86.47 attack
bruteforce detected
2020-09-13 22:59:37
94.102.49.109 attackbots
TCP port : 2870
2020-09-13 22:42:30
222.186.42.7 attackbots
Sep 13 16:48:19 eventyay sshd[11523]: Failed password for root from 222.186.42.7 port 62489 ssh2
Sep 13 16:48:29 eventyay sshd[11526]: Failed password for root from 222.186.42.7 port 28863 ssh2
Sep 13 16:48:32 eventyay sshd[11526]: Failed password for root from 222.186.42.7 port 28863 ssh2
...
2020-09-13 22:53:06
69.119.85.43 attackspam
SSH/22 MH Probe, BF, Hack -
2020-09-13 22:58:57
27.116.255.153 attack
Sep  7 10:00:49 haigwepa dovecot: auth-worker(10542): sql(dailymotion@pupat-ghestem.net,27.116.255.153,): unknown user
Sep  7 10:10:17 haigwepa dovecot: auth-worker(11081): sql(roll20@pupat-ghestem.net,27.116.255.153,): unknown user
...
2020-09-13 23:02:26
222.186.42.137 attackbots
Sep 13 16:52:02 piServer sshd[22126]: Failed password for root from 222.186.42.137 port 61382 ssh2
Sep 13 16:52:06 piServer sshd[22126]: Failed password for root from 222.186.42.137 port 61382 ssh2
Sep 13 16:52:10 piServer sshd[22126]: Failed password for root from 222.186.42.137 port 61382 ssh2
...
2020-09-13 22:58:03
148.101.229.107 attackbots
Sep 12 20:44:06 kunden sshd[22642]: Address 148.101.229.107 maps to 107.229.101.148.d.dyn.claro.net.do, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Sep 12 20:44:06 kunden sshd[22642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.101.229.107  user=r.r
Sep 12 20:44:09 kunden sshd[22642]: Failed password for r.r from 148.101.229.107 port 37398 ssh2
Sep 12 20:44:09 kunden sshd[22642]: Received disconnect from 148.101.229.107: 11: Bye Bye [preauth]
Sep 12 20:50:54 kunden sshd[28292]: Address 148.101.229.107 maps to 107.229.101.148.d.dyn.claro.net.do, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Sep 12 20:50:54 kunden sshd[28292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.101.229.107  user=r.r
Sep 12 20:50:57 kunden sshd[28292]: Failed password for r.r from 148.101.229.107 port 52499 ssh2
Sep 12 20:50:57 kunden sshd[28292]: Rece........
-------------------------------
2020-09-13 22:46:08
47.254.178.40 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-09-13 22:44:11
117.50.13.13 attack
2020-09-13 09:28:44.341256-0500  localhost sshd[69370]: Failed password for root from 117.50.13.13 port 55836 ssh2
2020-09-13 22:34:34
189.187.32.164 attack
Automatic report - Port Scan Attack
2020-09-13 22:50:22
46.218.85.69 attackbots
2020-09-13T16:23:38.268966vps773228.ovh.net sshd[15147]: Failed password for invalid user uucp from 46.218.85.69 port 33957 ssh2
2020-09-13T16:28:12.450066vps773228.ovh.net sshd[15213]: Invalid user oracle from 46.218.85.69 port 40282
2020-09-13T16:28:12.458954vps773228.ovh.net sshd[15213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.218.85.69
2020-09-13T16:28:12.450066vps773228.ovh.net sshd[15213]: Invalid user oracle from 46.218.85.69 port 40282
2020-09-13T16:28:14.515296vps773228.ovh.net sshd[15213]: Failed password for invalid user oracle from 46.218.85.69 port 40282 ssh2
...
2020-09-13 22:35:24
64.139.73.170 attackbots
Brute-force attempt banned
2020-09-13 22:26:09

Recently Reported IPs

150.105.193.102 240.39.206.138 83.254.47.167 41.216.200.205
230.193.222.214 197.167.189.197 52.179.10.188 52.39.217.16
131.172.30.125 80.237.10.232 4.90.174.200 31.1.78.159
157.158.163.165 209.44.194.35 34.88.129.122 224.106.23.98
181.130.139.228 144.191.151.64 208.49.63.4 78.118.43.44