Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.142.186.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49079
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;29.142.186.70.			IN	A

;; AUTHORITY SECTION:
.			479	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023032900 1800 900 604800 86400

;; Query time: 86 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 29 16:38:11 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 70.186.142.29.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.186.142.29.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
85.239.35.130 attackbots
 TCP (SYN) 85.239.35.130:15348 -> port 22, len 60
2020-09-27 20:52:40
61.177.172.168 attackspam
Sep 27 14:51:54 abendstille sshd\[6999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.168  user=root
Sep 27 14:51:56 abendstille sshd\[6999\]: Failed password for root from 61.177.172.168 port 21120 ssh2
Sep 27 14:52:07 abendstille sshd\[6999\]: Failed password for root from 61.177.172.168 port 21120 ssh2
Sep 27 14:52:10 abendstille sshd\[6999\]: Failed password for root from 61.177.172.168 port 21120 ssh2
Sep 27 14:52:16 abendstille sshd\[7363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.168  user=root
...
2020-09-27 20:54:41
94.51.25.1 attackbotsspam
 TCP (SYN) 94.51.25.1:52731 -> port 1080, len 52
2020-09-27 20:37:25
128.199.181.2 attackspambots
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.181.2 
Failed password for invalid user oracle from 128.199.181.2 port 30531 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.181.2
2020-09-27 20:55:48
211.103.213.45 attackbots
IP 211.103.213.45 attacked honeypot on port: 1433 at 9/27/2020 5:25:25 AM
2020-09-27 20:46:10
76.75.94.10 attackbotsspam
Sep 26 20:43:02 lanister sshd[10797]: Invalid user steve from 76.75.94.10
Sep 26 20:43:02 lanister sshd[10797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.75.94.10
Sep 26 20:43:02 lanister sshd[10797]: Invalid user steve from 76.75.94.10
Sep 26 20:43:03 lanister sshd[10797]: Failed password for invalid user steve from 76.75.94.10 port 46566 ssh2
2020-09-27 20:59:42
54.228.69.48 attack
xmlrpc attack
2020-09-27 20:41:22
41.143.38.249 attackbots
php WP PHPmyadamin ABUSE blocked for 12h
2020-09-27 20:35:25
221.213.115.48 attackbots
19507/tcp 15715/tcp 25165/tcp
[2020-09-09/26]3pkt
2020-09-27 21:08:15
167.172.25.74 attack
Automated report - ssh fail2ban:
Sep 27 14:52:50 Unable to negotiate with 167.172.25.74 port=47092: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Sep 27 14:52:51 Unable to negotiate with 167.172.25.74 port=48080: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Sep 27 14:52:51 Unable to negotiate with 167.172.25.74 port=48948: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Sep 27 14:52:52 Unable to negotiate with 167.172.25.74 port=49878: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
2020-09-27 20:54:52
192.35.168.43 attackbots
88/tcp 8081/tcp 8089/tcp...
[2020-08-07/09-26]16pkt,12pt.(tcp),2pt.(udp)
2020-09-27 20:31:46
103.145.13.43 attackspam
scans 2 times in preceeding hours on the ports (in chronological order) 50802 5038 resulting in total of 23 scans from 103.145.13.0/24 block.
2020-09-27 21:03:56
106.12.87.83 attackspam
" "
2020-09-27 21:09:13
189.8.16.174 attackbots
23/tcp 23/tcp 23/tcp...
[2020-08-20/09-26]4pkt,1pt.(tcp)
2020-09-27 20:50:15
164.68.105.165 attackbotsspam
 TCP (SYN) 164.68.105.165:41861 -> port 5038, len 44
2020-09-27 20:47:35

Recently Reported IPs

223.106.63.251 71.158.127.55 242.129.171.193 44.152.163.218
155.91.189.74 173.189.175.2 211.220.236.163 54.50.34.250
13.39.212.41 177.21.7.5 198.67.155.0 213.107.32.211
182.116.0.73 185.227.7.94 96.149.112.129 247.221.116.13
199.75.169.138 173.111.132.198 214.231.187.246 208.199.137.234