Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.245.102.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60002
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;29.245.102.41.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022801 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 02:27:15 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 41.102.245.29.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 41.102.245.29.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
77.121.81.204 attackspambots
Jul 28 12:48:17 dhoomketu sshd[1962713]: Invalid user ls from 77.121.81.204 port 23672
Jul 28 12:48:17 dhoomketu sshd[1962713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.121.81.204 
Jul 28 12:48:17 dhoomketu sshd[1962713]: Invalid user ls from 77.121.81.204 port 23672
Jul 28 12:48:18 dhoomketu sshd[1962713]: Failed password for invalid user ls from 77.121.81.204 port 23672 ssh2
Jul 28 12:52:13 dhoomketu sshd[1962765]: Invalid user xushan from 77.121.81.204 port 26761
...
2020-07-28 15:22:36
118.24.83.41 attackbots
2020-07-28T07:02:55.492818vps773228.ovh.net sshd[4019]: Invalid user zhangjunli from 118.24.83.41 port 54136
2020-07-28T07:02:55.511391vps773228.ovh.net sshd[4019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.83.41
2020-07-28T07:02:55.492818vps773228.ovh.net sshd[4019]: Invalid user zhangjunli from 118.24.83.41 port 54136
2020-07-28T07:02:57.241473vps773228.ovh.net sshd[4019]: Failed password for invalid user zhangjunli from 118.24.83.41 port 54136 ssh2
2020-07-28T07:05:57.015396vps773228.ovh.net sshd[4067]: Invalid user xywei from 118.24.83.41 port 57980
...
2020-07-28 14:45:14
161.35.104.69 attackbotsspam
161.35.104.69 - - [28/Jul/2020:07:52:54 +0200] "GET /wp-login.php HTTP/1.1" 200 6398 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
161.35.104.69 - - [28/Jul/2020:07:52:59 +0200] "POST /wp-login.php HTTP/1.1" 200 6649 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
161.35.104.69 - - [28/Jul/2020:07:53:01 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-28 14:47:43
23.105.194.254 attackbots
ssh brute force
2020-07-28 14:43:19
134.209.63.140 attackspambots
port scan and connect, tcp 4569 (iax2)
2020-07-28 14:42:28
106.51.50.2 attackspam
Jul 28 09:10:55 eventyay sshd[19306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.50.2
Jul 28 09:10:57 eventyay sshd[19306]: Failed password for invalid user zfdeng from 106.51.50.2 port 10039 ssh2
Jul 28 09:17:03 eventyay sshd[19471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.50.2
...
2020-07-28 15:22:48
180.76.142.19 attack
Jul 28 06:42:48 plex-server sshd[625948]: Invalid user lixiangfeng from 180.76.142.19 port 52160
Jul 28 06:42:48 plex-server sshd[625948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.142.19 
Jul 28 06:42:48 plex-server sshd[625948]: Invalid user lixiangfeng from 180.76.142.19 port 52160
Jul 28 06:42:49 plex-server sshd[625948]: Failed password for invalid user lixiangfeng from 180.76.142.19 port 52160 ssh2
Jul 28 06:44:38 plex-server sshd[626879]: Invalid user vsftpd from 180.76.142.19 port 44160
...
2020-07-28 14:55:35
212.98.190.52 attack
Jul 28 06:35:24 jumpserver sshd[278931]: Invalid user impala from 212.98.190.52 port 59886
Jul 28 06:35:26 jumpserver sshd[278931]: Failed password for invalid user impala from 212.98.190.52 port 59886 ssh2
Jul 28 06:38:38 jumpserver sshd[279031]: Invalid user ghazih from 212.98.190.52 port 55400
...
2020-07-28 15:19:56
211.239.124.246 attackbots
Invalid user liana from 211.239.124.246 port 40967
2020-07-28 15:05:29
61.177.172.102 attackbotsspam
Jul 28 08:41:52 * sshd[17400]: Failed password for root from 61.177.172.102 port 54410 ssh2
2020-07-28 14:46:41
199.76.38.123 attackspam
Invalid user pi from 199.76.38.123 port 36116
2020-07-28 15:03:24
211.80.102.182 attackbots
Jul 28 06:39:50 sigma sshd\[30385\]: Invalid user 10109 from 211.80.102.182Jul 28 06:39:53 sigma sshd\[30385\]: Failed password for invalid user 10109 from 211.80.102.182 port 53278 ssh2
...
2020-07-28 14:52:22
192.241.173.142 attackbotsspam
SSH BruteForce Attack
2020-07-28 15:06:08
204.48.23.76 attackbots
Jul 28 08:23:49 rotator sshd\[21211\]: Invalid user zelin from 204.48.23.76Jul 28 08:23:51 rotator sshd\[21211\]: Failed password for invalid user zelin from 204.48.23.76 port 53416 ssh2Jul 28 08:27:33 rotator sshd\[22007\]: Invalid user user4 from 204.48.23.76Jul 28 08:27:35 rotator sshd\[22007\]: Failed password for invalid user user4 from 204.48.23.76 port 35650 ssh2Jul 28 08:31:10 rotator sshd\[22805\]: Invalid user chouping from 204.48.23.76Jul 28 08:31:12 rotator sshd\[22805\]: Failed password for invalid user chouping from 204.48.23.76 port 46114 ssh2
...
2020-07-28 14:52:47
14.189.206.6 attackbots
07/27/2020-23:54:32.405499 14.189.206.6 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-07-28 15:10:41

Recently Reported IPs

41.36.105.90 21.224.233.96 155.216.102.87 38.159.19.15
48.77.118.200 16.67.235.1 80.200.207.142 125.41.99.113
250.13.45.19 88.173.129.171 245.101.127.189 224.62.100.51
19.206.133.218 43.28.190.79 240.28.141.1 64.146.54.221
178.178.41.179 187.115.124.132 199.6.69.241 6.33.10.234