Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.30.132.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23967
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;29.30.132.119.			IN	A

;; AUTHORITY SECTION:
.			589	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020032001 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 21 01:53:07 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 119.132.30.29.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 119.132.30.29.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.88.112.116 attackspambots
SSH-BruteForce
2019-10-18 06:40:47
112.85.42.227 attack
Oct 17 18:38:14 TORMINT sshd\[30438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227  user=root
Oct 17 18:38:16 TORMINT sshd\[30438\]: Failed password for root from 112.85.42.227 port 30337 ssh2
Oct 17 18:38:18 TORMINT sshd\[30438\]: Failed password for root from 112.85.42.227 port 30337 ssh2
...
2019-10-18 06:41:24
54.39.196.199 attack
2019-10-17T22:33:51.300495abusebot-2.cloudsearch.cf sshd\[17242\]: Invalid user dbnconne99 from 54.39.196.199 port 48368
2019-10-18 06:43:35
49.235.84.51 attackspam
Oct 18 00:43:09 MK-Soft-VM7 sshd[9967]: Failed password for root from 49.235.84.51 port 42552 ssh2
...
2019-10-18 06:53:55
216.83.44.102 attackspam
2019-10-17T23:29:29.577635scmdmz1 sshd\[8020\]: Invalid user p@ssw0rd from 216.83.44.102 port 43328
2019-10-17T23:29:29.580227scmdmz1 sshd\[8020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.83.44.102
2019-10-17T23:29:30.948697scmdmz1 sshd\[8020\]: Failed password for invalid user p@ssw0rd from 216.83.44.102 port 43328 ssh2
...
2019-10-18 06:25:47
201.17.130.197 attackspam
Dec  2 18:26:54 odroid64 sshd\[27162\]: Invalid user techiweb from 201.17.130.197
Dec  2 18:26:54 odroid64 sshd\[27162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.130.197
Dec  2 18:26:56 odroid64 sshd\[27162\]: Failed password for invalid user techiweb from 201.17.130.197 port 54450 ssh2
Dec  4 10:57:14 odroid64 sshd\[11936\]: Invalid user chris from 201.17.130.197
Dec  4 10:57:14 odroid64 sshd\[11936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.130.197
Dec  4 10:57:17 odroid64 sshd\[11936\]: Failed password for invalid user chris from 201.17.130.197 port 47471 ssh2
Dec  9 10:48:13 odroid64 sshd\[27599\]: Invalid user mcadmin from 201.17.130.197
Dec  9 10:48:13 odroid64 sshd\[27599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.130.197
Dec  9 10:48:15 odroid64 sshd\[27599\]: Failed password for invalid user mcadmin from 2
...
2019-10-18 06:49:05
140.143.57.159 attackbots
2019-10-17T22:03:59.964451abusebot-5.cloudsearch.cf sshd\[10431\]: Invalid user arkserver from 140.143.57.159 port 54080
2019-10-18 06:22:04
164.52.152.248 attackspam
Unauthorised access (Oct 17) SRC=164.52.152.248 LEN=40 TOS=0x10 PREC=0x40 TTL=241 ID=34035 TCP DPT=1433 WINDOW=1024 SYN
2019-10-18 06:49:20
103.95.97.121 attackbots
Automatic report - Banned IP Access
2019-10-18 06:42:34
217.77.221.85 attack
$f2bV_matches
2019-10-18 06:43:58
218.104.231.2 attackbotsspam
Oct 17 18:37:09 TORMINT sshd\[30163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.104.231.2  user=root
Oct 17 18:37:11 TORMINT sshd\[30163\]: Failed password for root from 218.104.231.2 port 50401 ssh2
Oct 17 18:41:48 TORMINT sshd\[31532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.104.231.2  user=root
...
2019-10-18 06:58:26
190.109.80.22 attackspam
firewall-block, port(s): 1433/tcp
2019-10-18 06:57:25
104.238.120.6 attackbotsspam
xmlrpc attack
2019-10-18 06:22:31
60.249.21.129 attackbotsspam
Oct 17 21:08:45 ip-172-31-1-72 sshd\[30064\]: Invalid user chaoyang from 60.249.21.129
Oct 17 21:08:45 ip-172-31-1-72 sshd\[30064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.249.21.129
Oct 17 21:08:47 ip-172-31-1-72 sshd\[30064\]: Failed password for invalid user chaoyang from 60.249.21.129 port 55980 ssh2
Oct 17 21:12:55 ip-172-31-1-72 sshd\[30249\]: Invalid user rootredhat from 60.249.21.129
Oct 17 21:12:55 ip-172-31-1-72 sshd\[30249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.249.21.129
2019-10-18 06:28:40
201.190.139.76 attackbotsspam
Jan 22 07:33:32 odroid64 sshd\[20899\]: Invalid user ts3serwer from 201.190.139.76
Jan 22 07:33:32 odroid64 sshd\[20899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.190.139.76
Jan 22 07:33:34 odroid64 sshd\[20899\]: Failed password for invalid user ts3serwer from 201.190.139.76 port 31009 ssh2
Jan 23 11:07:41 odroid64 sshd\[6122\]: Invalid user email from 201.190.139.76
Jan 23 11:07:41 odroid64 sshd\[6122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.190.139.76
Jan 23 11:07:43 odroid64 sshd\[6122\]: Failed password for invalid user email from 201.190.139.76 port 29505 ssh2
...
2019-10-18 06:23:33

Recently Reported IPs

161.35.13.180 103.45.161.101 80.232.177.177 71.6.233.41
216.14.172.161 133.171.171.154 16.63.143.228 25.173.218.80
32.64.14.224 147.60.129.104 211.31.162.89 84.76.33.135
181.12.182.7 159.222.164.17 228.211.92.84 36.126.191.100
210.226.21.230 52.57.35.77 121.233.67.21 147.43.168.143