Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Columbus

Region: Ohio

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.82.142.174
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65426
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;29.82.142.174.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013101 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 03:44:36 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 174.142.82.29.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 174.142.82.29.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
152.136.87.219 attackspambots
Apr 21 08:52:57 mailserver sshd\[8275\]: Invalid user postgres from 152.136.87.219
...
2020-04-21 17:53:39
122.224.131.116 attackbots
Invalid user postgres from 122.224.131.116 port 34676
2020-04-21 18:05:19
138.197.189.136 attackspambots
2020-04-21T10:16:59.570886  sshd[20759]: Invalid user cf from 138.197.189.136 port 41676
2020-04-21T10:16:59.586585  sshd[20759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.189.136
2020-04-21T10:16:59.570886  sshd[20759]: Invalid user cf from 138.197.189.136 port 41676
2020-04-21T10:17:01.078567  sshd[20759]: Failed password for invalid user cf from 138.197.189.136 port 41676 ssh2
...
2020-04-21 18:20:13
201.241.158.108 attack
2020-04-21T11:44:09.430231struts4.enskede.local sshd\[22357\]: Invalid user admin from 201.241.158.108 port 42390
2020-04-21T11:44:09.437204struts4.enskede.local sshd\[22357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=pc-108-158-241-201.cm.vtr.net
2020-04-21T11:44:12.879245struts4.enskede.local sshd\[22357\]: Failed password for invalid user admin from 201.241.158.108 port 42390 ssh2
2020-04-21T11:46:37.337874struts4.enskede.local sshd\[22375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=pc-108-158-241-201.cm.vtr.net  user=root
2020-04-21T11:46:40.538878struts4.enskede.local sshd\[22375\]: Failed password for root from 201.241.158.108 port 34384 ssh2
...
2020-04-21 18:28:19
103.23.102.3 attackbots
Invalid user hk from 103.23.102.3 port 51266
2020-04-21 18:05:37
80.211.137.127 attackbotsspam
Apr 21 11:48:28 DAAP sshd[7515]: Invalid user informix from 80.211.137.127 port 58082
Apr 21 11:48:28 DAAP sshd[7515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.137.127
Apr 21 11:48:28 DAAP sshd[7515]: Invalid user informix from 80.211.137.127 port 58082
Apr 21 11:48:30 DAAP sshd[7515]: Failed password for invalid user informix from 80.211.137.127 port 58082 ssh2
Apr 21 11:52:24 DAAP sshd[7555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.137.127  user=root
Apr 21 11:52:26 DAAP sshd[7555]: Failed password for root from 80.211.137.127 port 45764 ssh2
...
2020-04-21 18:01:43
168.195.206.195 attackspambots
20/4/20@23:49:57: FAIL: Alarm-Network address from=168.195.206.195
20/4/20@23:49:57: FAIL: Alarm-Network address from=168.195.206.195
...
2020-04-21 18:24:38
190.202.44.194 attack
$f2bV_matches
2020-04-21 17:54:16
173.161.70.37 attackspam
2020-04-21T09:37:31.577397abusebot.cloudsearch.cf sshd[29240]: Invalid user dt from 173.161.70.37 port 42262
2020-04-21T09:37:31.583342abusebot.cloudsearch.cf sshd[29240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173-161-70-37-illinois.hfc.comcastbusiness.net
2020-04-21T09:37:31.577397abusebot.cloudsearch.cf sshd[29240]: Invalid user dt from 173.161.70.37 port 42262
2020-04-21T09:37:33.428350abusebot.cloudsearch.cf sshd[29240]: Failed password for invalid user dt from 173.161.70.37 port 42262 ssh2
2020-04-21T09:42:32.920721abusebot.cloudsearch.cf sshd[29813]: Invalid user sx from 173.161.70.37 port 34002
2020-04-21T09:42:32.928688abusebot.cloudsearch.cf sshd[29813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173-161-70-37-illinois.hfc.comcastbusiness.net
2020-04-21T09:42:32.920721abusebot.cloudsearch.cf sshd[29813]: Invalid user sx from 173.161.70.37 port 34002
2020-04-21T09:42:35.431995abusebot
...
2020-04-21 18:27:34
84.17.51.84 attack
(From apps@connect.software) Please share with your superior: 
 
The world is on quarantine. People stay at home. Lack of eye contact makes consumers frustrated. 
 
Win over the situation! Establish direct contact with your client. get every participant connected into your new digital process with Connect remote collaboration technology! 
 
Upgrade your website with live video & chats allowing every process participant to interact digitally. Launch a brand mobile app of your brand to reach audience with phones and tablets for cross-platform compatibility. 
 
Receive more orders as a result of free app notifications and automated messaging. 
Sell more with built-in chatbots, live operator chats & real-time video calls. 
 
Boost staff effectiveness and improve sales within a matter of weeks from app activation! 
 
Activate a start version of our white-label remote collaboration platform with live chats and instant video calls. 
 
Get an app within a week to open your own secure digital gateway fo
2020-04-21 18:26:50
179.70.138.97 attackbots
Apr 21 10:46:52 ms-srv sshd[40136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.70.138.97
Apr 21 10:46:54 ms-srv sshd[40136]: Failed password for invalid user ac from 179.70.138.97 port 31937 ssh2
2020-04-21 18:17:32
35.190.151.173 attack
Tried to login to my NAS device 272 times
2020-04-21 17:55:29
206.189.47.166 attackbotsspam
$f2bV_matches
2020-04-21 18:12:55
187.188.51.157 attackspam
2020-04-21T10:17:41.513188struts4.enskede.local sshd\[21307\]: Invalid user ks from 187.188.51.157 port 35422
2020-04-21T10:17:41.519600struts4.enskede.local sshd\[21307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fixed-187-188-51-157.totalplay.net
2020-04-21T10:17:43.908866struts4.enskede.local sshd\[21307\]: Failed password for invalid user ks from 187.188.51.157 port 35422 ssh2
2020-04-21T10:21:45.982753struts4.enskede.local sshd\[21369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fixed-187-188-51-157.totalplay.net  user=root
2020-04-21T10:21:49.282445struts4.enskede.local sshd\[21369\]: Failed password for root from 187.188.51.157 port 50814 ssh2
...
2020-04-21 18:07:09
198.108.67.86 attackspambots
Port scan(s) denied
2020-04-21 18:03:16

Recently Reported IPs

35.35.140.100 73.46.228.16 176.152.218.171 73.122.39.250
156.238.103.132 240.157.218.3 64.61.154.130 78.65.139.28
23.118.91.173 244.149.140.27 173.247.35.89 8.135.170.141
135.202.29.67 224.40.241.92 213.75.226.247 234.216.64.229
96.215.61.117 118.131.85.160 224.180.128.145 211.131.214.13