Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.242.132.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5480
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;29.242.132.119.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 11:56:00 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 119.132.242.29.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 119.132.242.29.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.2.190.194 attackbotsspam
Sep  7 11:46:59 hpm sshd\[13632\]: Invalid user system from 14.2.190.194
Sep  7 11:46:59 hpm sshd\[13632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.2.190.194
Sep  7 11:47:00 hpm sshd\[13632\]: Failed password for invalid user system from 14.2.190.194 port 34856 ssh2
Sep  7 11:52:16 hpm sshd\[14093\]: Invalid user ftpuser from 14.2.190.194
Sep  7 11:52:16 hpm sshd\[14093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.2.190.194
2019-09-08 07:18:24
200.199.6.204 attackspam
Sep  7 13:39:16 php2 sshd\[4015\]: Invalid user 123456 from 200.199.6.204
Sep  7 13:39:16 php2 sshd\[4015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.199.6.204
Sep  7 13:39:18 php2 sshd\[4015\]: Failed password for invalid user 123456 from 200.199.6.204 port 45842 ssh2
Sep  7 13:44:45 php2 sshd\[4461\]: Invalid user iamroot from 200.199.6.204
Sep  7 13:44:45 php2 sshd\[4461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.199.6.204
2019-09-08 07:46:51
149.202.45.205 attack
Sep  7 16:48:16 aat-srv002 sshd[22030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.45.205
Sep  7 16:48:19 aat-srv002 sshd[22030]: Failed password for invalid user test from 149.202.45.205 port 55392 ssh2
Sep  7 16:52:19 aat-srv002 sshd[22126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.45.205
Sep  7 16:52:21 aat-srv002 sshd[22126]: Failed password for invalid user system from 149.202.45.205 port 42756 ssh2
...
2019-09-08 07:14:27
81.145.158.178 attackspambots
SSH Brute-Force reported by Fail2Ban
2019-09-08 07:53:56
37.187.113.229 attack
Jan 27 10:40:09 vtv3 sshd\[23809\]: Invalid user webmail from 37.187.113.229 port 50850
Jan 27 10:40:09 vtv3 sshd\[23809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.113.229
Jan 27 10:40:11 vtv3 sshd\[23809\]: Failed password for invalid user webmail from 37.187.113.229 port 50850 ssh2
Jan 27 10:44:41 vtv3 sshd\[24460\]: Invalid user openvpn from 37.187.113.229 port 54806
Jan 27 10:44:41 vtv3 sshd\[24460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.113.229
Feb 12 14:05:38 vtv3 sshd\[23839\]: Invalid user systemuser from 37.187.113.229 port 46390
Feb 12 14:05:38 vtv3 sshd\[23839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.113.229
Feb 12 14:05:40 vtv3 sshd\[23839\]: Failed password for invalid user systemuser from 37.187.113.229 port 46390 ssh2
Feb 12 14:10:46 vtv3 sshd\[25219\]: Invalid user sysadm from 37.187.113.229 port 36688
Feb 12 14:10:46
2019-09-08 07:23:14
213.14.116.235 attack
xmlrpc attack
2019-09-08 07:21:46
137.74.171.160 attack
Sep  7 23:27:58 vm-dfa0dd01 sshd[54067]: Invalid user csr1dev from 137.74.171.160 port 58888
...
2019-09-08 07:39:24
174.71.159.134 attackspambots
Sep  7 13:20:43 hiderm sshd\[14260\]: Invalid user webmo from 174.71.159.134
Sep  7 13:20:43 hiderm sshd\[14260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=wsip-174-71-159-134.ks.ks.cox.net
Sep  7 13:20:45 hiderm sshd\[14260\]: Failed password for invalid user webmo from 174.71.159.134 port 33916 ssh2
Sep  7 13:28:02 hiderm sshd\[14840\]: Invalid user minecraft from 174.71.159.134
Sep  7 13:28:02 hiderm sshd\[14840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=wsip-174-71-159-134.ks.ks.cox.net
2019-09-08 07:47:34
142.93.208.219 attackspambots
Sep  7 13:18:40 eddieflores sshd\[27227\]: Invalid user postgres from 142.93.208.219
Sep  7 13:18:40 eddieflores sshd\[27227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.208.219
Sep  7 13:18:42 eddieflores sshd\[27227\]: Failed password for invalid user postgres from 142.93.208.219 port 34816 ssh2
Sep  7 13:23:09 eddieflores sshd\[27563\]: Invalid user oracle from 142.93.208.219
Sep  7 13:23:09 eddieflores sshd\[27563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.208.219
2019-09-08 07:33:17
104.251.236.182 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-07 21:18:21,548 INFO [amun_request_handler] PortScan Detected on Port: 445 (104.251.236.182)
2019-09-08 07:06:57
175.137.68.203 attackbotsspam
" "
2019-09-08 07:51:55
178.17.166.149 attack
fail2ban honeypot
2019-09-08 07:49:56
34.67.159.1 attack
Sep  8 00:58:19 vps691689 sshd[19460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.67.159.1
Sep  8 00:58:21 vps691689 sshd[19460]: Failed password for invalid user postgres from 34.67.159.1 port 58994 ssh2
...
2019-09-08 07:09:50
122.224.129.35 attack
Sep  8 02:36:24 taivassalofi sshd[40123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.129.35
Sep  8 02:36:26 taivassalofi sshd[40123]: Failed password for invalid user redmine from 122.224.129.35 port 40488 ssh2
...
2019-09-08 07:40:29
54.37.154.254 attack
Sep  8 00:44:36 pkdns2 sshd\[64507\]: Invalid user christian from 54.37.154.254Sep  8 00:44:38 pkdns2 sshd\[64507\]: Failed password for invalid user christian from 54.37.154.254 port 49733 ssh2Sep  8 00:48:23 pkdns2 sshd\[64700\]: Invalid user mc from 54.37.154.254Sep  8 00:48:25 pkdns2 sshd\[64700\]: Failed password for invalid user mc from 54.37.154.254 port 43636 ssh2Sep  8 00:52:17 pkdns2 sshd\[64867\]: Invalid user ts3bot from 54.37.154.254Sep  8 00:52:19 pkdns2 sshd\[64867\]: Failed password for invalid user ts3bot from 54.37.154.254 port 37547 ssh2
...
2019-09-08 07:15:01

Recently Reported IPs

165.14.142.64 45.218.64.178 15.173.62.34 90.182.137.45
107.109.73.246 181.139.188.58 47.110.186.167 172.165.204.35
49.226.217.87 51.56.168.62 83.178.205.59 133.243.83.36
227.89.135.57 113.48.140.129 125.110.55.44 54.29.38.192
161.109.255.70 99.143.250.105 185.67.35.56 75.209.135.168