Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.2.101.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37093
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;29.2.101.133.			IN	A

;; AUTHORITY SECTION:
.			384	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040700 1800 900 604800 86400

;; Query time: 116 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 07 14:56:53 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 133.101.2.29.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.101.2.29.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
157.245.234.138 attack
port scan and connect, tcp 5432 (postgresql)
2020-06-09 01:59:05
46.101.206.205 attack
Jun  8 11:44:47 Host-KLAX-C sshd[2669]: User root from 46.101.206.205 not allowed because not listed in AllowUsers
...
2020-06-09 02:00:51
106.12.186.121 attackbotsspam
Jun  8 19:50:45 melroy-server sshd[11418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.186.121 
Jun  8 19:50:47 melroy-server sshd[11418]: Failed password for invalid user admin from 106.12.186.121 port 22479 ssh2
...
2020-06-09 01:56:18
59.148.103.163 attackbots
Honeypot attack, port: 5555, PTR: 059148103163.ctinets.com.
2020-06-09 01:58:50
124.251.110.147 attackbotsspam
2020-06-08T16:43:05.746734vps773228.ovh.net sshd[9882]: Failed password for root from 124.251.110.147 port 47150 ssh2
2020-06-08T16:49:13.067566vps773228.ovh.net sshd[9952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.251.110.147  user=root
2020-06-08T16:49:15.699100vps773228.ovh.net sshd[9952]: Failed password for root from 124.251.110.147 port 35660 ssh2
2020-06-08T16:55:34.495738vps773228.ovh.net sshd[10060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.251.110.147  user=root
2020-06-08T16:55:36.429863vps773228.ovh.net sshd[10060]: Failed password for root from 124.251.110.147 port 52404 ssh2
...
2020-06-09 02:15:40
102.23.247.106 attack
Automatic report - Port Scan Attack
2020-06-09 02:18:26
198.108.66.252 attackspam
Unauthorized connection attempt detected from IP address 198.108.66.252 to port 22 [T]
2020-06-09 02:25:22
212.83.183.57 attackspambots
Bruteforce detected by fail2ban
2020-06-09 01:46:24
119.27.168.199 attack
119.27.168.199 - - \[08/Jun/2020:15:03:47 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 729 "-" "Apache-HttpClient/4.5.2 \(Java/1.8.0_151\)"
119.27.168.199 - - \[08/Jun/2020:15:03:49 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 729 "-" "Apache-HttpClient/4.5.2 \(Java/1.8.0_151\)"
119.27.168.199 - - \[08/Jun/2020:15:03:52 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 729 "-" "Apache-HttpClient/4.5.2 \(Java/1.8.0_151\)"
2020-06-09 01:56:02
125.161.107.87 attackbotsspam
Unauthorized IMAP connection attempt
2020-06-09 02:00:07
182.61.161.121 attack
DATE:2020-06-08 16:04:51, IP:182.61.161.121, PORT:ssh SSH brute force auth (docker-dc)
2020-06-09 02:22:39
77.87.101.20 attackbots
Unauthorized connection attempt from IP address 77.87.101.20 on Port 445(SMB)
2020-06-09 02:20:33
40.134.163.163 attackspam
Unauthorized connection attempt from IP address 40.134.163.163 on Port 445(SMB)
2020-06-09 02:11:45
185.165.169.168 attackbotsspam
Jun  8 17:00:34 roki-contabo sshd\[10964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.165.169.168  user=root
Jun  8 17:00:35 roki-contabo sshd\[10964\]: Failed password for root from 185.165.169.168 port 55180 ssh2
Jun  8 17:09:58 roki-contabo sshd\[11060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.165.169.168  user=root
Jun  8 17:10:00 roki-contabo sshd\[11060\]: Failed password for root from 185.165.169.168 port 50456 ssh2
Jun  8 17:15:20 roki-contabo sshd\[11142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.165.169.168  user=root
...
2020-06-09 02:27:30
49.206.9.39 attack
Honeypot attack, port: 445, PTR: broadband.actcorp.in.
2020-06-09 02:02:42

Recently Reported IPs

132.232.14.159 52.137.14.192 36.90.91.209 202.104.180.186
202.92.201.94 190.214.10.179 186.234.80.195 125.211.19.111
87.98.157.6 190.89.188.128 178.46.214.31 134.209.236.191
154.213.22.66 174.126.181.104 142.93.35.169 124.164.102.104
40.156.239.128 70.180.225.97 103.151.156.177 185.126.79.54