Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.158.50.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31135
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;29.158.50.29.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121401 1800 900 604800 86400

;; Query time: 144 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 15 10:37:59 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 29.50.158.29.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 29.50.158.29.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
27.71.209.22 attackbots
Unauthorized connection attempt from IP address 27.71.209.22 on Port 445(SMB)
2019-11-06 06:22:51
51.254.139.219 attackbotsspam
Wordpress bruteforce
2019-11-06 06:09:41
42.114.199.48 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 05-11-2019 14:30:28.
2019-11-06 06:17:45
189.58.77.115 attackbotsspam
" "
2019-11-06 06:11:12
46.201.106.115 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 05-11-2019 14:30:29.
2019-11-06 06:16:42
37.229.197.198 attack
Unauthorized connection attempt from IP address 37.229.197.198 on Port 445(SMB)
2019-11-06 06:23:37
185.234.216.209 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 05-11-2019 14:30:24.
2019-11-06 06:23:11
179.56.104.220 attack
Unauthorized connection attempt from IP address 179.56.104.220 on Port 445(SMB)
2019-11-06 06:33:58
174.86.144.170 attack
Port scan
2019-11-06 06:38:17
196.27.127.61 attack
Nov  5 15:25:52 srv01 sshd[31301]: Invalid user iz from 196.27.127.61
Nov  5 15:25:52 srv01 sshd[31301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.27.127.61
Nov  5 15:25:52 srv01 sshd[31301]: Invalid user iz from 196.27.127.61
Nov  5 15:25:54 srv01 sshd[31301]: Failed password for invalid user iz from 196.27.127.61 port 46496 ssh2
Nov  5 15:30:31 srv01 sshd[31489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.27.127.61  user=root
Nov  5 15:30:34 srv01 sshd[31489]: Failed password for root from 196.27.127.61 port 34306 ssh2
...
2019-11-06 06:05:12
104.89.31.107 attackbots
11/05/2019-21:38:52.871340 104.89.31.107 Protocol: 6 SURICATA TLS invalid record/traffic
2019-11-06 06:09:25
87.70.112.88 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 05-11-2019 14:30:30.
2019-11-06 06:14:34
77.222.96.93 attack
Unauthorized connection attempt from IP address 77.222.96.93 on Port 445(SMB)
2019-11-06 06:36:25
223.73.116.214 attack
SpamReport
2019-11-06 06:34:46
23.244.74.2 attackbots
" "
2019-11-06 06:07:01

Recently Reported IPs

238.213.252.1 79.191.253.205 156.1.28.74 132.147.42.234
86.104.241.106 242.245.59.232 35.58.39.8 87.186.9.156
88.238.36.123 65.95.89.84 217.18.168.163 11.74.43.141
206.5.151.101 100.16.144.32 183.127.63.13 20.186.191.173
219.85.140.114 78.49.163.97 1.53.205.50 188.194.87.196