Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.113.245.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48632
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;29.113.245.92.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 18:25:40 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 92.245.113.29.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 92.245.113.29.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.62.194 attackspam
Invalid user luke from 106.13.62.194 port 33452
2019-10-29 07:14:58
106.75.93.253 attackbots
Oct 28 23:00:22 hcbbdb sshd\[11910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.93.253  user=root
Oct 28 23:00:25 hcbbdb sshd\[11910\]: Failed password for root from 106.75.93.253 port 38864 ssh2
Oct 28 23:04:57 hcbbdb sshd\[12368\]: Invalid user david from 106.75.93.253
Oct 28 23:04:57 hcbbdb sshd\[12368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.93.253
Oct 28 23:04:58 hcbbdb sshd\[12368\]: Failed password for invalid user david from 106.75.93.253 port 49208 ssh2
2019-10-29 07:14:43
58.87.67.142 attackspambots
Invalid user jboss from 58.87.67.142 port 53256
2019-10-29 07:21:51
182.72.178.114 attack
Invalid user shuan from 182.72.178.114 port 33420
2019-10-29 07:07:09
54.39.246.33 attackspam
Oct 28 23:54:03 ns41 sshd[28810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.246.33
2019-10-29 07:22:46
111.230.157.219 attackbotsspam
Invalid user fz from 111.230.157.219 port 48610
2019-10-29 07:13:57
94.191.79.156 attackspam
Invalid user benedito from 94.191.79.156 port 45084
2019-10-29 07:18:06
27.150.169.223 attackbotsspam
Invalid user abaco from 27.150.169.223 port 42948
2019-10-29 07:01:08
202.73.9.76 attack
Invalid user User from 202.73.9.76 port 34375
2019-10-29 07:04:46
108.222.68.232 attackbots
$f2bV_matches
2019-10-29 07:14:12
46.45.109.231 attack
Invalid user admin from 46.45.109.231 port 39583
2019-10-29 07:23:47
84.192.104.54 attack
Invalid user alex from 84.192.104.54 port 35145
2019-10-29 07:19:02
106.12.113.223 attackspambots
Oct 29 01:15:39 sauna sshd[61190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.113.223
Oct 29 01:15:41 sauna sshd[61190]: Failed password for invalid user bodiesel from 106.12.113.223 port 35950 ssh2
...
2019-10-29 07:16:07
140.143.90.154 attackbotsspam
Invalid user penelope from 140.143.90.154 port 55140
2019-10-29 07:32:26
72.167.9.245 attackbotsspam
Invalid user usuario from 72.167.9.245 port 40784
2019-10-29 06:55:44

Recently Reported IPs

155.129.35.66 177.121.57.157 211.32.96.109 130.4.104.44
55.223.233.113 33.252.117.37 33.113.232.53 176.67.31.161
145.117.140.212 241.96.222.154 69.194.107.19 4.61.16.65
98.148.239.119 27.120.240.94 81.101.70.246 177.11.60.3
233.255.96.138 23.215.192.228 108.41.220.222 207.246.1.167