Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.221.234.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13633
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;29.221.234.30.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 17:01:57 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 30.234.221.29.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 30.234.221.29.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
177.191.248.250 attackbotsspam
Automatic report - Port Scan Attack
2020-10-10 19:00:07
207.154.244.110 attackspam
Oct 10 11:04:36 ovpn sshd\[5990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.244.110  user=root
Oct 10 11:04:38 ovpn sshd\[5990\]: Failed password for root from 207.154.244.110 port 39452 ssh2
Oct 10 11:20:34 ovpn sshd\[10453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.244.110  user=root
Oct 10 11:20:35 ovpn sshd\[10453\]: Failed password for root from 207.154.244.110 port 51554 ssh2
Oct 10 11:25:16 ovpn sshd\[11812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.244.110  user=root
2020-10-10 18:41:59
222.240.169.12 attack
2020-10-10 05:51:29.001045-0500  localhost sshd[542]: Failed password for invalid user admin from 222.240.169.12 port 50398 ssh2
2020-10-10 19:08:21
114.141.55.178 attackspam
Oct 10 12:04:22 s1 sshd\[19725\]: User root from 114.141.55.178 not allowed because not listed in AllowUsers
Oct 10 12:04:22 s1 sshd\[19725\]: Failed password for invalid user root from 114.141.55.178 port 58458 ssh2
Oct 10 12:08:21 s1 sshd\[20742\]: User root from 114.141.55.178 not allowed because not listed in AllowUsers
Oct 10 12:08:21 s1 sshd\[20742\]: Failed password for invalid user root from 114.141.55.178 port 35784 ssh2
Oct 10 12:12:18 s1 sshd\[22133\]: User root from 114.141.55.178 not allowed because not listed in AllowUsers
Oct 10 12:12:18 s1 sshd\[22133\]: Failed password for invalid user root from 114.141.55.178 port 41348 ssh2
...
2020-10-10 18:31:10
191.193.171.13 attackspam
Unauthorized connection attempt detected from IP address 191.193.171.13 to port 23
2020-10-10 19:06:16
222.137.236.248 attackbotsspam
GPON Home Routers Remote Code Execution Vulnerability
2020-10-10 18:45:49
165.227.129.57 attack
165.227.129.57 - - [10/Oct/2020:03:45:34 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.227.129.57 - - [10/Oct/2020:03:57:11 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.227.129.57 - - [10/Oct/2020:05:47:57 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-10-10 19:05:35
192.99.4.145 attackbots
SSH brute force
2020-10-10 18:30:48
112.85.42.85 attack
Brute-force attempt banned
2020-10-10 18:47:04
49.234.95.189 attackbotsspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-10-10 18:42:39
200.73.128.148 attackbotsspam
5x Failed Password
2020-10-10 18:58:07
182.23.3.226 attackbots
Oct 10 09:32:11 ip-172-31-61-156 sshd[27659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.23.3.226  user=root
Oct 10 09:32:13 ip-172-31-61-156 sshd[27659]: Failed password for root from 182.23.3.226 port 56030 ssh2
Oct 10 09:34:09 ip-172-31-61-156 sshd[27712]: Invalid user wwwuser from 182.23.3.226
Oct 10 09:34:09 ip-172-31-61-156 sshd[27712]: Invalid user wwwuser from 182.23.3.226
...
2020-10-10 18:35:27
183.6.100.56 attackspam
Unauthorized connection attempt from IP address 183.6.100.56 on Port 445(SMB)
2020-10-10 19:10:38
13.68.108.3 attackspambots
13.68.108.3 was recorded 5 times by 1 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 5, 48, 81
2020-10-10 18:47:21
37.44.252.164 attackspam
C1,Magento Bruteforce Login Attack POST /index.php/admin/
2020-10-10 18:54:15

Recently Reported IPs

37.41.152.139 88.69.55.59 126.184.190.132 87.16.156.242
154.240.123.171 249.12.125.247 143.7.41.78 255.221.42.144
137.224.142.230 70.136.248.221 207.193.120.161 76.254.104.237
42.21.76.130 56.254.229.70 177.141.109.114 134.117.169.96
138.154.123.77 204.236.252.42 211.78.45.82 54.87.6.46