Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.247.45.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 361
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;29.247.45.11.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 13:50:08 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 11.45.247.29.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.45.247.29.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
158.140.137.39 attack
IMAP
2020-06-26 03:01:13
51.75.249.224 attack
invalid login attempt (suporte)
2020-06-26 03:19:58
185.32.46.73 attack
Brute forcing RDP port 3389
2020-06-26 03:25:19
84.2.226.70 attackbotsspam
Brute force attempt
2020-06-26 03:17:14
61.177.172.61 attackspambots
Jun 25 20:54:47 server sshd[20671]: Failed none for root from 61.177.172.61 port 6278 ssh2
Jun 25 20:54:49 server sshd[20671]: Failed password for root from 61.177.172.61 port 6278 ssh2
Jun 25 20:54:53 server sshd[20671]: Failed password for root from 61.177.172.61 port 6278 ssh2
2020-06-26 03:31:19
27.2.137.238 attack
Unauthorized connection attempt: SRC=27.2.137.238
...
2020-06-26 03:24:46
177.124.14.219 attackspambots
Jun 25 11:39:54 pl1server sshd[17209]: reveeclipse mapping checking getaddrinfo for 219-14-124-177.vivasinternet.com.br [177.124.14.219] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 25 11:39:54 pl1server sshd[17209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.124.14.219  user=r.r
Jun 25 11:39:57 pl1server sshd[17209]: Failed password for r.r from 177.124.14.219 port 45462 ssh2
Jun 25 11:39:57 pl1server sshd[17209]: Received disconnect from 177.124.14.219: 11: Bye Bye [preauth]
Jun 25 11:42:37 pl1server sshd[17484]: reveeclipse mapping checking getaddrinfo for 219-14-124-177.vivasinternet.com.br [177.124.14.219] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 25 11:42:37 pl1server sshd[17484]: Invalid user yaroslav from 177.124.14.219
Jun 25 11:42:37 pl1server sshd[17484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.124.14.219


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=17
2020-06-26 03:11:43
103.90.155.210 attackbots
Jun 25 16:20:43 l03 sshd[4263]: Invalid user post from 103.90.155.210 port 58742
...
2020-06-26 03:14:20
145.239.82.11 attack
Jun 25 18:17:17 h1745522 sshd[11745]: Invalid user kang from 145.239.82.11 port 59622
Jun 25 18:17:17 h1745522 sshd[11745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.82.11
Jun 25 18:17:17 h1745522 sshd[11745]: Invalid user kang from 145.239.82.11 port 59622
Jun 25 18:17:19 h1745522 sshd[11745]: Failed password for invalid user kang from 145.239.82.11 port 59622 ssh2
Jun 25 18:19:52 h1745522 sshd[11842]: Invalid user user from 145.239.82.11 port 44106
Jun 25 18:19:52 h1745522 sshd[11842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.82.11
Jun 25 18:19:52 h1745522 sshd[11842]: Invalid user user from 145.239.82.11 port 44106
Jun 25 18:19:54 h1745522 sshd[11842]: Failed password for invalid user user from 145.239.82.11 port 44106 ssh2
Jun 25 18:22:29 h1745522 sshd[11923]: Invalid user admin from 145.239.82.11 port 56834
...
2020-06-26 03:13:14
69.1.254.111 attack
Second attempt in a month, to login to Yahoo account.
2020-06-26 02:58:44
119.235.255.142 attack
Fail2Ban Ban Triggered
2020-06-26 03:26:59
159.69.81.205 attack
Jun 26 01:35:03 itv-usvr-01 sshd[7198]: Invalid user tomcat from 159.69.81.205
Jun 26 01:35:03 itv-usvr-01 sshd[7198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.69.81.205
Jun 26 01:35:03 itv-usvr-01 sshd[7198]: Invalid user tomcat from 159.69.81.205
Jun 26 01:35:05 itv-usvr-01 sshd[7198]: Failed password for invalid user tomcat from 159.69.81.205 port 50648 ssh2
Jun 26 01:37:59 itv-usvr-01 sshd[7350]: Invalid user gpx from 159.69.81.205
2020-06-26 03:05:47
117.239.232.59 attack
SSH brute force attempt
2020-06-26 02:59:00
103.100.209.172 attack
2020-06-25T17:38:25.864750abusebot.cloudsearch.cf sshd[32325]: Invalid user vincent from 103.100.209.172 port 47742
2020-06-25T17:38:25.870206abusebot.cloudsearch.cf sshd[32325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.100.209.172
2020-06-25T17:38:25.864750abusebot.cloudsearch.cf sshd[32325]: Invalid user vincent from 103.100.209.172 port 47742
2020-06-25T17:38:27.517560abusebot.cloudsearch.cf sshd[32325]: Failed password for invalid user vincent from 103.100.209.172 port 47742 ssh2
2020-06-25T17:42:32.530607abusebot.cloudsearch.cf sshd[32413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.100.209.172  user=root
2020-06-25T17:42:34.755015abusebot.cloudsearch.cf sshd[32413]: Failed password for root from 103.100.209.172 port 47720 ssh2
2020-06-25T17:46:17.744261abusebot.cloudsearch.cf sshd[32459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.10
...
2020-06-26 03:22:45
89.40.114.6 attackbots
2020-06-25T17:10:00.086896lavrinenko.info sshd[914]: Failed password for root from 89.40.114.6 port 37620 ssh2
2020-06-25T17:13:24.855163lavrinenko.info sshd[1114]: Invalid user aud from 89.40.114.6 port 35464
2020-06-25T17:13:24.865814lavrinenko.info sshd[1114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.40.114.6
2020-06-25T17:13:24.855163lavrinenko.info sshd[1114]: Invalid user aud from 89.40.114.6 port 35464
2020-06-25T17:13:27.132274lavrinenko.info sshd[1114]: Failed password for invalid user aud from 89.40.114.6 port 35464 ssh2
...
2020-06-26 03:09:32

Recently Reported IPs

164.171.254.217 38.159.193.218 67.244.167.221 207.68.37.70
237.86.132.141 9.84.217.134 254.6.62.96 37.159.106.82
6.66.186.141 110.254.202.241 235.188.55.189 117.130.49.85
101.199.66.146 108.139.236.50 87.20.230.192 242.247.38.86
109.29.106.206 122.187.22.217 71.154.244.171 6.61.114.242