Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.191.70.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34416
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;29.191.70.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 22:59:09 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 21.70.191.29.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.70.191.29.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.180.147 attackspam
Nov 10 23:33:37 microserver sshd[44821]: Failed none for root from 222.186.180.147 port 57014 ssh2
Nov 10 23:33:38 microserver sshd[44821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147  user=root
Nov 10 23:33:39 microserver sshd[44821]: Failed password for root from 222.186.180.147 port 57014 ssh2
Nov 10 23:33:42 microserver sshd[44821]: Failed password for root from 222.186.180.147 port 57014 ssh2
Nov 10 23:33:45 microserver sshd[44821]: Failed password for root from 222.186.180.147 port 57014 ssh2
Nov 11 02:20:10 microserver sshd[4028]: Failed none for root from 222.186.180.147 port 21182 ssh2
Nov 11 02:20:10 microserver sshd[4028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147  user=root
Nov 11 02:20:12 microserver sshd[4028]: Failed password for root from 222.186.180.147 port 21182 ssh2
Nov 11 02:20:16 microserver sshd[4028]: Failed password for root from 222.186.180.147 port 21182 ssh2
Nov
2019-11-12 17:32:24
61.92.14.168 attack
2019-11-12T08:57:30.316561abusebot-4.cloudsearch.cf sshd\[24293\]: Invalid user user2 from 61.92.14.168 port 47886
2019-11-12 17:21:13
123.161.205.21 attackspam
" "
2019-11-12 17:23:59
181.114.140.2 attack
Nov 12 07:22:41 pl3server sshd[11874]: Failed password for r.r from 181.114.140.2 port 58391 ssh2
Nov 12 07:22:43 pl3server sshd[11874]: Failed password for r.r from 181.114.140.2 port 58391 ssh2
Nov 12 07:22:46 pl3server sshd[11874]: Failed password for r.r from 181.114.140.2 port 58391 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=181.114.140.2
2019-11-12 17:34:06
120.132.29.195 attack
[Aegis] @ 2019-11-12 07:27:56  0000 -> SSH insecure connection attempt (scan).
2019-11-12 17:42:56
146.66.244.246 attackspam
Nov 11 21:29:07 sachi sshd\[3250\]: Invalid user test from 146.66.244.246
Nov 11 21:29:07 sachi sshd\[3250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.66.244.246
Nov 11 21:29:09 sachi sshd\[3250\]: Failed password for invalid user test from 146.66.244.246 port 41264 ssh2
Nov 11 21:33:18 sachi sshd\[3565\]: Invalid user dbus from 146.66.244.246
Nov 11 21:33:18 sachi sshd\[3565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.66.244.246
2019-11-12 17:47:26
202.141.230.30 attack
Nov 12 11:26:43 sauna sshd[152999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.141.230.30
Nov 12 11:26:45 sauna sshd[152999]: Failed password for invalid user 7777777 from 202.141.230.30 port 40072 ssh2
...
2019-11-12 17:33:42
68.168.132.49 attackspambots
Nov 11 16:39:51 kmh-mb-001 sshd[26648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.168.132.49  user=r.r
Nov 11 16:39:53 kmh-mb-001 sshd[26648]: Failed password for r.r from 68.168.132.49 port 59020 ssh2
Nov 11 16:39:54 kmh-mb-001 sshd[26648]: Received disconnect from 68.168.132.49 port 59020:11: Bye Bye [preauth]
Nov 11 16:39:54 kmh-mb-001 sshd[26648]: Disconnected from 68.168.132.49 port 59020 [preauth]
Nov 11 16:52:37 kmh-mb-001 sshd[27058]: Invalid user 123 from 68.168.132.49 port 33542
Nov 11 16:52:37 kmh-mb-001 sshd[27058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.168.132.49
Nov 11 16:52:40 kmh-mb-001 sshd[27058]: Failed password for invalid user 123 from 68.168.132.49 port 33542 ssh2
Nov 11 16:52:40 kmh-mb-001 sshd[27058]: Received disconnect from 68.168.132.49 port 33542:11: Bye Bye [preauth]
Nov 11 16:52:40 kmh-mb-001 sshd[27058]: Disconnected from 68.168.132.49 por........
-------------------------------
2019-11-12 17:20:25
202.152.15.12 attack
Nov 12 14:57:25 areeb-Workstation sshd[29656]: Failed password for root from 202.152.15.12 port 36744 ssh2
...
2019-11-12 17:33:23
149.56.16.168 attackspambots
Nov 11 22:47:06 php1 sshd\[5612\]: Invalid user thora from 149.56.16.168
Nov 11 22:47:06 php1 sshd\[5612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.16.168
Nov 11 22:47:08 php1 sshd\[5612\]: Failed password for invalid user thora from 149.56.16.168 port 36764 ssh2
Nov 11 22:50:49 php1 sshd\[5953\]: Invalid user roelofs from 149.56.16.168
Nov 11 22:50:49 php1 sshd\[5953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.16.168
2019-11-12 17:40:23
94.228.17.204 attackspambots
Autoban   94.228.17.204 AUTH/CONNECT
2019-11-12 17:26:26
178.128.247.219 attackspam
2019-11-12T09:07:36.738110shield sshd\[20377\]: Invalid user papin from 178.128.247.219 port 34504
2019-11-12T09:07:36.743997shield sshd\[20377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.247.219
2019-11-12T09:07:38.850954shield sshd\[20377\]: Failed password for invalid user papin from 178.128.247.219 port 34504 ssh2
2019-11-12T09:11:20.974986shield sshd\[20839\]: Invalid user rumsey from 178.128.247.219 port 43366
2019-11-12T09:11:20.979335shield sshd\[20839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.247.219
2019-11-12 17:12:10
156.67.222.12 attackbots
miraklein.com 156.67.222.12 \[12/Nov/2019:07:28:26 +0100\] "POST /xmlrpc.php HTTP/1.1" 301 439 "-" "WordPress/4.8.8\;"
miraniessen.de 156.67.222.12 \[12/Nov/2019:07:28:28 +0100\] "POST /xmlrpc.php HTTP/1.1" 200 4213 "-" "WordPress/4.8.8\;"
2019-11-12 17:34:29
175.106.38.51 attackspam
Nov 12 07:22:43 mxgate1 postfix/postscreen[24898]: CONNECT from [175.106.38.51]:53600 to [176.31.12.44]:25
Nov 12 07:22:43 mxgate1 postfix/dnsblog[24915]: addr 175.106.38.51 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 12 07:22:43 mxgate1 postfix/dnsblog[25010]: addr 175.106.38.51 listed by domain zen.spamhaus.org as 127.0.0.11
Nov 12 07:22:43 mxgate1 postfix/dnsblog[25010]: addr 175.106.38.51 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 12 07:22:43 mxgate1 postfix/dnsblog[24918]: addr 175.106.38.51 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 12 07:22:43 mxgate1 postfix/postscreen[24898]: PREGREET 22 after 0.25 from [175.106.38.51]:53600: EHLO [175.106.38.51]

Nov 12 07:22:44 mxgate1 postfix/postscreen[24898]: DNSBL rank 4 for [175.106.38.51]:53600
Nov x@x
Nov 12 07:22:47 mxgate1 postfix/postscreen[24898]: HANGUP after 2.8 from [175.106.38.51]:53600 in tests after SMTP handshake
Nov 12 07:22:47 mxgate1 postfix/postscreen[24898]: DISCONNECT [175.1........
-------------------------------
2019-11-12 17:37:19
2001:bc8:4734:a70d::1 attackspambots
C1,WP GET /suche/wp-login.php
2019-11-12 17:44:42

Recently Reported IPs

151.71.80.158 69.141.159.163 8.203.200.97 25.37.119.143
173.197.100.189 160.80.220.160 50.74.206.7 251.3.208.184
133.2.9.172 237.147.40.70 47.219.253.136 19.145.61.39
207.44.164.2 92.158.57.107 195.247.76.132 202.100.43.89
104.3.107.233 185.80.198.193 174.222.141.170 204.12.214.122