Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.197.214.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32505
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;29.197.214.130.			IN	A

;; AUTHORITY SECTION:
.			129	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023032900 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 29 17:51:20 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 130.214.197.29.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 130.214.197.29.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
191.242.76.166 attackspambots
failed_logins
2020-07-07 12:56:41
50.206.109.218 attackspam
3389BruteforceStormFW21
2020-07-07 12:39:21
35.244.25.124 attackspambots
SSH Brute-Force reported by Fail2Ban
2020-07-07 12:29:38
188.213.49.176 attackbots
SSH Brute Force
2020-07-07 12:32:52
41.72.198.40 attackspambots
3389BruteforceStormFW21
2020-07-07 12:21:42
35.200.183.13 attack
(sshd) Failed SSH login from 35.200.183.13 (CA/Canada/13.183.200.35.bc.googleusercontent.com): 5 in the last 3600 secs
2020-07-07 12:46:59
183.89.76.133 attackbots
20/7/7@00:18:22: FAIL: Alarm-Network address from=183.89.76.133
20/7/7@00:18:22: FAIL: Alarm-Network address from=183.89.76.133
...
2020-07-07 12:22:10
58.219.152.45 attackspambots
Jul  7 05:56:22 host proftpd[2573]: 0.0.0.0 (58.219.152.45[58.219.152.45]) - USER www: no such user found from 58.219.152.45 [58.219.152.45] to 163.172.107.87:21
...
2020-07-07 12:41:50
180.76.163.31 attack
Jul  6 18:03:33 web9 sshd\[13300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.163.31  user=root
Jul  6 18:03:35 web9 sshd\[13300\]: Failed password for root from 180.76.163.31 port 57304 ssh2
Jul  6 18:05:54 web9 sshd\[13584\]: Invalid user if from 180.76.163.31
Jul  6 18:05:54 web9 sshd\[13584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.163.31
Jul  6 18:05:57 web9 sshd\[13584\]: Failed password for invalid user if from 180.76.163.31 port 60600 ssh2
2020-07-07 12:17:37
34.248.198.49 attack
07.07.2020 05:56:37 - Wordpress fail 
Detected by ELinOX-ALM
2020-07-07 12:35:45
45.136.109.158 attack
SmallBizIT.US 2 packets to tcp(3389,3391)
2020-07-07 12:28:14
151.80.35.68 attackbotsspam
SMB Server BruteForce Attack
2020-07-07 12:58:20
85.235.34.62 attackbotsspam
2020-07-07T06:00:39+0200 Failed SSH Authentication/Brute Force Attack.(Server 2)
2020-07-07 12:55:12
148.72.31.118 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-07-07 12:52:29
222.186.175.163 attackspam
2020-07-07T05:56:34.724685centos sshd[9453]: Failed password for root from 222.186.175.163 port 22782 ssh2
2020-07-07T05:56:39.421608centos sshd[9453]: Failed password for root from 222.186.175.163 port 22782 ssh2
2020-07-07T05:56:42.807026centos sshd[9453]: Failed password for root from 222.186.175.163 port 22782 ssh2
...
2020-07-07 12:16:56

Recently Reported IPs

166.153.192.69 123.173.129.214 219.0.86.146 141.132.121.218
40.222.241.113 23.206.33.155 226.141.129.71 254.13.192.56
123.244.86.75 77.42.132.247 204.136.229.105 204.194.201.125
216.86.176.221 169.165.148.246 232.162.144.234 32.213.48.112
70.82.222.202 226.193.10.16 123.96.204.4 190.131.152.81