Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.137.42.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13201
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;29.137.42.94.			IN	A

;; AUTHORITY SECTION:
.			514	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020021300 1800 900 604800 86400

;; Query time: 344 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 01:40:14 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 94.42.137.29.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 94.42.137.29.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
116.247.81.99 attackbotsspam
$f2bV_matches
2020-08-12 12:52:48
159.89.166.91 attack
Failed password for root from 159.89.166.91 port 47332 ssh2
2020-08-12 12:55:25
141.98.10.195 attackspam
$f2bV_matches
2020-08-12 12:37:52
81.91.177.177 attackbots
Port scan
2020-08-12 12:38:52
142.93.66.165 attackbotsspam
Automatic report - XMLRPC Attack
2020-08-12 12:58:02
139.155.127.59 attack
Aug 12 05:49:49 sip sshd[1275884]: Failed password for root from 139.155.127.59 port 45282 ssh2
Aug 12 05:54:26 sip sshd[1275941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.127.59  user=root
Aug 12 05:54:27 sip sshd[1275941]: Failed password for root from 139.155.127.59 port 41828 ssh2
...
2020-08-12 12:48:51
177.220.133.158 attackbots
SSH Brute Force
2020-08-12 12:40:12
219.142.149.210 attack
Aug 12 06:43:46 abendstille sshd\[4567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.142.149.210  user=root
Aug 12 06:43:48 abendstille sshd\[4567\]: Failed password for root from 219.142.149.210 port 37080 ssh2
Aug 12 06:47:11 abendstille sshd\[7671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.142.149.210  user=root
Aug 12 06:47:13 abendstille sshd\[7671\]: Failed password for root from 219.142.149.210 port 41014 ssh2
Aug 12 06:50:58 abendstille sshd\[11281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.142.149.210  user=root
...
2020-08-12 12:51:57
91.82.45.134 attackspam
(smtpauth) Failed SMTP AUTH login from 91.82.45.134 (HU/Hungary/keve-45-134.pool.kevenet.hu): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-12 08:24:42 plain authenticator failed for ([91.82.45.134]) [91.82.45.134]: 535 Incorrect authentication data (set_id=info@parisfoodco.com)
2020-08-12 12:34:19
5.135.164.201 attack
Aug 12 06:31:26 ns37 sshd[22857]: Failed password for root from 5.135.164.201 port 50528 ssh2
Aug 12 06:31:26 ns37 sshd[22857]: Failed password for root from 5.135.164.201 port 50528 ssh2
2020-08-12 12:46:02
192.35.168.138 attack
Unwanted checking 80 or 443 port
...
2020-08-12 13:07:22
189.47.214.28 attackbotsspam
Aug 12 06:27:55 buvik sshd[28300]: Failed password for root from 189.47.214.28 port 46264 ssh2
Aug 12 06:29:31 buvik sshd[28783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.47.214.28  user=root
Aug 12 06:29:32 buvik sshd[28783]: Failed password for root from 189.47.214.28 port 39350 ssh2
...
2020-08-12 12:44:39
206.253.167.10 attack
SSH Brute-Forcing (server2)
2020-08-12 12:43:17
46.101.165.62 attackbots
Aug 12 06:30:12 vmd17057 sshd[17702]: Failed password for root from 46.101.165.62 port 34150 ssh2
...
2020-08-12 13:12:47
94.74.180.184 attackspambots
(smtpauth) Failed SMTP AUTH login from 94.74.180.184 (IR/Iran/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-12 08:24:52 plain authenticator failed for ([94.74.180.184]) [94.74.180.184]: 535 Incorrect authentication data (set_id=info)
2020-08-12 12:30:27

Recently Reported IPs

5.188.168.26 14.184.71.32 213.24.115.42 63.80.185.166
179.97.31.54 95.138.33.28 102.152.52.105 172.172.30.212
108.39.119.92 79.114.95.215 46.72.45.140 217.147.169.253
94.53.244.15 189.112.174.142 163.172.57.247 35.207.98.222
27.64.13.203 27.147.224.98 226.209.36.247 45.66.62.7