Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.149.168.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12100
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;29.149.168.86.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 01:12:17 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 86.168.149.29.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 86.168.149.29.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
200.105.229.170 attack
Unauthorized connection attempt detected from IP address 200.105.229.170 to port 445
2020-02-10 01:57:21
222.186.180.130 attackbotsspam
Feb  9 18:49:14 MK-Soft-VM6 sshd[27196]: Failed password for root from 222.186.180.130 port 41063 ssh2
Feb  9 18:49:18 MK-Soft-VM6 sshd[27196]: Failed password for root from 222.186.180.130 port 41063 ssh2
...
2020-02-10 01:54:22
115.57.127.137 attackbotsspam
Feb  9 12:20:34 server sshd\[16403\]: Failed password for invalid user frappe from 115.57.127.137 port 35640 ssh2
Feb  9 18:37:26 server sshd\[11012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.57.127.137  user=root
Feb  9 18:37:28 server sshd\[11012\]: Failed password for root from 115.57.127.137 port 56856 ssh2
Feb  9 18:47:45 server sshd\[12678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.57.127.137  user=root
Feb  9 18:47:47 server sshd\[12678\]: Failed password for root from 115.57.127.137 port 43424 ssh2
...
2020-02-10 02:17:42
139.199.248.153 attack
Feb  9 19:23:28 server sshd\[18161\]: Invalid user kud from 139.199.248.153
Feb  9 19:23:28 server sshd\[18161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.153 
Feb  9 19:23:30 server sshd\[18161\]: Failed password for invalid user kud from 139.199.248.153 port 32834 ssh2
Feb  9 19:36:07 server sshd\[20403\]: Invalid user vzo from 139.199.248.153
Feb  9 19:36:07 server sshd\[20403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.153 
...
2020-02-10 02:33:50
109.11.143.232 attackspam
Brute force attempt
2020-02-10 02:13:38
203.109.112.210 attackbotsspam
Unauthorized connection attempt from IP address 203.109.112.210 on Port 445(SMB)
2020-02-10 02:36:05
124.114.177.237 attackbotsspam
Port probing on unauthorized port 1433
2020-02-10 02:33:02
45.233.107.70 attack
Unauthorized connection attempt from IP address 45.233.107.70 on Port 445(SMB)
2020-02-10 01:59:30
196.157.11.164 attackbotsspam
Unauthorized connection attempt from IP address 196.157.11.164 on Port 445(SMB)
2020-02-10 02:25:21
27.71.224.2 attackbots
2020-02-09T15:52:38.363046scmdmz1 sshd[13371]: Invalid user csy from 27.71.224.2 port 35742
2020-02-09T15:52:38.366028scmdmz1 sshd[13371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.224.2
2020-02-09T15:52:38.363046scmdmz1 sshd[13371]: Invalid user csy from 27.71.224.2 port 35742
2020-02-09T15:52:40.315895scmdmz1 sshd[13371]: Failed password for invalid user csy from 27.71.224.2 port 35742 ssh2
2020-02-09T15:56:26.172000scmdmz1 sshd[13724]: Invalid user rmm from 27.71.224.2 port 33244
...
2020-02-10 02:07:50
218.92.0.204 attackspambots
2020-02-09T18:51:24.091395vps751288.ovh.net sshd\[676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204  user=root
2020-02-09T18:51:26.200906vps751288.ovh.net sshd\[676\]: Failed password for root from 218.92.0.204 port 14383 ssh2
2020-02-09T18:51:28.855669vps751288.ovh.net sshd\[676\]: Failed password for root from 218.92.0.204 port 14383 ssh2
2020-02-09T18:51:31.253559vps751288.ovh.net sshd\[676\]: Failed password for root from 218.92.0.204 port 14383 ssh2
2020-02-09T18:52:51.759083vps751288.ovh.net sshd\[686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204  user=root
2020-02-10 01:54:59
120.132.116.86 attack
Feb  9 12:41:00 firewall sshd[24357]: Invalid user ycc from 120.132.116.86
Feb  9 12:41:03 firewall sshd[24357]: Failed password for invalid user ycc from 120.132.116.86 port 42888 ssh2
Feb  9 12:44:12 firewall sshd[24490]: Invalid user wqk from 120.132.116.86
...
2020-02-10 02:27:10
92.63.194.104 attackspam
$f2bV_matches
2020-02-10 02:35:01
82.102.142.164 attack
Feb  9 17:23:20 PAR-161229 sshd[39362]: Failed password for invalid user cxc from 82.102.142.164 port 40680 ssh2
Feb  9 17:39:07 PAR-161229 sshd[39701]: Failed password for invalid user evn from 82.102.142.164 port 43054 ssh2
Feb  9 17:42:16 PAR-161229 sshd[39842]: Failed password for invalid user nvf from 82.102.142.164 port 44302 ssh2
2020-02-10 02:16:28
112.215.209.79 attackbots
Unauthorized connection attempt from IP address 112.215.209.79 on Port 445(SMB)
2020-02-10 02:12:55

Recently Reported IPs

175.21.252.222 32.154.156.188 94.74.145.109 136.237.241.18
239.111.161.190 197.227.63.171 161.136.84.218 19.171.27.209
41.154.166.163 14.172.213.73 53.0.98.234 255.243.87.188
75.249.117.220 213.212.77.135 95.103.97.55 215.85.163.74
228.222.69.205 34.156.147.18 120.171.216.235 187.80.75.64