Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.138.103.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43288
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;29.138.103.133.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 14:52:23 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 133.103.138.29.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.103.138.29.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.112.72.130 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-09-16 14:06:57
142.4.213.28 attackbots
142.4.213.28 - - [16/Sep/2020:06:24:32 +0100] "POST /wp-login.php HTTP/1.1" 200 1861 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.213.28 - - [16/Sep/2020:06:24:33 +0100] "POST /wp-login.php HTTP/1.1" 200 1839 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.213.28 - - [16/Sep/2020:06:24:34 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-16 13:52:12
103.90.202.230 attackspambots
Unauthorized connection attempt from IP address 103.90.202.230 on Port 445(SMB)
2020-09-16 13:41:32
39.104.138.246 attack
39.104.138.246 - - [16/Sep/2020:06:38:28 +0200] "POST /wp-login.php HTTP/1.0" 200 4794 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-16 13:38:25
119.123.56.12 attackbotsspam
Brute force attempt
2020-09-16 13:47:54
220.87.172.196 attackbotsspam
10 attempts against mh-pma-try-ban on pole
2020-09-16 13:41:57
202.83.42.180 attack
Mirai and Reaper Exploitation Traffic
2020-09-16 13:49:41
45.86.68.237 attackspambots
port scan
2020-09-16 14:02:52
218.79.219.25 attack
Unauthorized connection attempt from IP address 218.79.219.25 on Port 445(SMB)
2020-09-16 14:04:01
166.175.60.109 attackspam
Brute forcing email accounts
2020-09-16 14:05:03
119.237.53.14 attackbotsspam
Sep 15 04:00:10 scw-focused-cartwright sshd[28871]: Failed password for root from 119.237.53.14 port 41758 ssh2
2020-09-16 13:44:05
223.214.227.15 attack
Sep 15 06:19:47 Tower sshd[8162]: refused connect from 222.186.175.151 (222.186.175.151)
Sep 15 10:13:01 Tower sshd[8162]: refused connect from 112.85.42.187 (112.85.42.187)
Sep 15 13:09:34 Tower sshd[8162]: Connection from 223.214.227.15 port 33494 on 192.168.10.220 port 22 rdomain ""
Sep 15 13:09:43 Tower sshd[8162]: Failed password for root from 223.214.227.15 port 33494 ssh2
Sep 15 13:09:44 Tower sshd[8162]: Received disconnect from 223.214.227.15 port 33494:11: Bye Bye [preauth]
Sep 15 13:09:44 Tower sshd[8162]: Disconnected from authenticating user root 223.214.227.15 port 33494 [preauth]
2020-09-16 13:31:46
2.186.229.131 attackbotsspam
Unauthorized connection attempt from IP address 2.186.229.131 on Port 445(SMB)
2020-09-16 13:39:34
34.66.251.252 attack
DATE:2020-09-16 07:23:12, IP:34.66.251.252, PORT:ssh SSH brute force auth (docker-dc)
2020-09-16 13:31:23
157.245.108.109 attack
$f2bV_matches
2020-09-16 13:57:10

Recently Reported IPs

14.222.15.84 127.205.224.153 248.76.133.71 95.227.55.186
144.67.140.89 4.168.3.252 79.144.146.61 69.201.39.224
55.51.145.172 98.94.50.0 220.226.125.202 163.60.140.240
109.121.152.49 213.62.251.170 233.155.126.36 83.250.31.194
245.190.191.42 222.225.11.161 121.122.226.239 173.109.137.28