Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.194.169.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32688
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;29.194.169.149.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:15:35 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 149.169.194.29.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.169.194.29.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.235.93.192 attackbots
May 21 00:24:31 prox sshd[25925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.93.192 
May 21 00:24:33 prox sshd[25925]: Failed password for invalid user kwc from 49.235.93.192 port 58442 ssh2
2020-05-21 06:38:41
190.146.13.180 attackspam
Invalid user fjk from 190.146.13.180 port 49057
2020-05-21 06:54:56
46.10.69.127 attack
Hacker using this IP address becarefull !
2020-05-21 06:51:55
139.199.82.171 attackspambots
340. On May 20 2020 experienced a Brute Force SSH login attempt -> 83 unique times by 139.199.82.171.
2020-05-21 06:53:41
119.29.205.52 attackbotsspam
Invalid user uzz from 119.29.205.52 port 43134
2020-05-21 06:54:06
218.92.0.158 attack
May 21 00:48:35 melroy-server sshd[450]: Failed password for root from 218.92.0.158 port 19978 ssh2
May 21 00:48:41 melroy-server sshd[450]: Failed password for root from 218.92.0.158 port 19978 ssh2
...
2020-05-21 06:56:26
222.186.175.163 attackbots
2020-05-21T00:59:00.615458sd-86998 sshd[35205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163  user=root
2020-05-21T00:59:02.480914sd-86998 sshd[35205]: Failed password for root from 222.186.175.163 port 3140 ssh2
2020-05-21T00:59:06.029970sd-86998 sshd[35205]: Failed password for root from 222.186.175.163 port 3140 ssh2
2020-05-21T00:59:00.615458sd-86998 sshd[35205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163  user=root
2020-05-21T00:59:02.480914sd-86998 sshd[35205]: Failed password for root from 222.186.175.163 port 3140 ssh2
2020-05-21T00:59:06.029970sd-86998 sshd[35205]: Failed password for root from 222.186.175.163 port 3140 ssh2
2020-05-21T00:59:00.615458sd-86998 sshd[35205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163  user=root
2020-05-21T00:59:02.480914sd-86998 sshd[35205]: Failed password for root fr
...
2020-05-21 07:04:16
49.212.43.150 attackspam
Invalid user sdz from 49.212.43.150 port 47234
2020-05-21 06:41:41
192.3.142.52 attack
Registration form abuse
2020-05-21 06:51:06
115.29.246.243 attack
Invalid user developer from 115.29.246.243 port 51787
2020-05-21 06:36:49
51.178.68.98 attackbots
xmlrpc attack
2020-05-21 06:56:59
128.199.140.175 attackspam
Invalid user bgz from 128.199.140.175 port 49986
2020-05-21 06:45:07
198.27.82.182 attackspambots
May 20 23:41:38 vps sshd[13096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.27.82.182 
May 20 23:41:40 vps sshd[13096]: Failed password for invalid user lisuzhen from 198.27.82.182 port 60578 ssh2
May 20 23:42:59 vps sshd[13224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.27.82.182 
...
2020-05-21 07:00:16
51.77.200.101 attack
Invalid user man from 51.77.200.101 port 46254
2020-05-21 07:08:14
63.240.240.74 attackbotsspam
Invalid user eqc from 63.240.240.74 port 44348
2020-05-21 06:33:36

Recently Reported IPs

78.186.227.217 119.219.154.43 230.37.253.231 205.10.83.151
173.31.219.12 245.205.103.102 127.168.192.233 88.103.73.128
151.246.148.32 210.139.145.18 71.150.148.24 6.238.98.153
213.240.222.168 167.89.245.38 80.151.4.118 195.28.197.195
92.174.225.52 73.217.28.44 202.228.91.148 178.9.249.206