Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.243.136.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19153
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;29.243.136.52.			IN	A

;; AUTHORITY SECTION:
.			252	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 05:03:49 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 52.136.243.29.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.136.243.29.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.249.92.66 attackspambots
Mar  7 06:49:33 hpm sshd\[31325\]: Invalid user speech-dispatcher from 45.249.92.66
Mar  7 06:49:33 hpm sshd\[31325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.249.92.66
Mar  7 06:49:35 hpm sshd\[31325\]: Failed password for invalid user speech-dispatcher from 45.249.92.66 port 47704 ssh2
Mar  7 06:54:12 hpm sshd\[31693\]: Invalid user wangxx from 45.249.92.66
Mar  7 06:54:12 hpm sshd\[31693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.249.92.66
2020-03-08 00:58:28
192.241.219.121 attackspam
Mar  7 16:12:32 nopemail postfix/smtps/smtpd[12669]: SSL_accept error from unknown[192.241.219.121]: -1
...
2020-03-08 01:07:14
61.223.79.196 attackspambots
Unauthorized connection attempt from IP address 61.223.79.196 on Port 445(SMB)
2020-03-08 00:24:00
85.227.196.4 attackspambots
Honeypot attack, port: 5555, PTR: c-04c4e355.014-164-6e6b7010.bbcust.telenor.se.
2020-03-08 00:26:19
182.160.125.18 attackspam
Unauthorized connection attempt from IP address 182.160.125.18 on Port 445(SMB)
2020-03-08 00:54:00
66.70.205.186 attackspambots
Mar  7 03:44:19 hanapaa sshd\[12536\]: Invalid user chendaocheng from 66.70.205.186
Mar  7 03:44:19 hanapaa sshd\[12536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=downloads.falepleno.com.br
Mar  7 03:44:20 hanapaa sshd\[12536\]: Failed password for invalid user chendaocheng from 66.70.205.186 port 37278 ssh2
Mar  7 03:47:18 hanapaa sshd\[12779\]: Invalid user ec2-user from 66.70.205.186
Mar  7 03:47:18 hanapaa sshd\[12779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=downloads.falepleno.com.br
2020-03-08 00:29:54
138.122.61.66 attack
Unauthorized connection attempt from IP address 138.122.61.66 on Port 445(SMB)
2020-03-08 00:36:56
196.43.155.209 attack
Mar  7 05:48:55 mockhub sshd[2408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.43.155.209
Mar  7 05:48:57 mockhub sshd[2408]: Failed password for invalid user prueba from 196.43.155.209 port 38374 ssh2
...
2020-03-08 00:31:33
104.244.74.97 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-03-08 00:38:57
87.26.48.139 attackspam
port scan and connect, tcp 80 (http)
2020-03-08 00:34:23
86.105.52.90 attackspam
Mar  7 16:06:27 hcbbdb sshd\[30047\]: Invalid user csgoserver from 86.105.52.90
Mar  7 16:06:27 hcbbdb sshd\[30047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.105.52.90
Mar  7 16:06:30 hcbbdb sshd\[30047\]: Failed password for invalid user csgoserver from 86.105.52.90 port 56760 ssh2
Mar  7 16:11:40 hcbbdb sshd\[30781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.105.52.90  user=root
Mar  7 16:11:42 hcbbdb sshd\[30781\]: Failed password for root from 86.105.52.90 port 58192 ssh2
2020-03-08 00:28:16
103.82.235.2 attackbots
LGS,WP GET /wp-login.php
2020-03-08 00:39:28
107.170.49.174 attack
Mar  7 17:31:21 lnxweb62 sshd[20344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.49.174
2020-03-08 01:00:38
103.81.115.119 attackspam
Unauthorized connection attempt from IP address 103.81.115.119 on Port 445(SMB)
2020-03-08 00:43:25
202.43.164.162 attack
Mar  2 16:13:09 liveconfig01 sshd[7127]: Invalid user luett from 202.43.164.162
Mar  2 16:13:09 liveconfig01 sshd[7127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.43.164.162
Mar  2 16:13:11 liveconfig01 sshd[7127]: Failed password for invalid user luett from 202.43.164.162 port 47164 ssh2
Mar  2 16:13:12 liveconfig01 sshd[7127]: Received disconnect from 202.43.164.162 port 47164:11: Normal Shutdown [preauth]
Mar  2 16:13:12 liveconfig01 sshd[7127]: Disconnected from 202.43.164.162 port 47164 [preauth]
Mar  2 16:18:18 liveconfig01 sshd[7478]: Invalid user luett from 202.43.164.162
Mar  2 16:18:18 liveconfig01 sshd[7478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.43.164.162
Mar  2 16:18:20 liveconfig01 sshd[7478]: Failed password for invalid user luett from 202.43.164.162 port 60312 ssh2
Mar  2 16:18:20 liveconfig01 sshd[7478]: Received disconnect from 202.43.164.162 port 6........
-------------------------------
2020-03-08 00:20:55

Recently Reported IPs

154.178.93.219 56.188.132.6 180.10.11.53 230.54.246.221
239.226.226.135 204.223.100.190 150.212.124.80 128.105.135.43
12.162.161.44 40.33.66.115 115.179.136.206 34.10.226.237
66.217.3.208 218.91.143.106 121.52.33.40 100.245.156.41
1.247.236.212 30.37.80.181 134.159.74.128 145.195.200.78