Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Arab Emirates (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.29.212.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38927
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;3.29.212.38.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121700 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 17 14:55:23 CST 2025
;; MSG SIZE  rcvd: 104
Host info
38.212.29.3.in-addr.arpa domain name pointer ec2-3-29-212-38.me-central-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
38.212.29.3.in-addr.arpa	name = ec2-3-29-212-38.me-central-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
178.151.242.93 attackbotsspam
port scan and connect, tcp 80 (http)
2020-01-04 15:40:10
196.45.144.68 attack
Unauthorized connection attempt detected from IP address 196.45.144.68 to port 1433
2020-01-04 15:48:02
118.27.31.188 attack
Jan  4 05:48:45 legacy sshd[4037]: Failed password for postfix from 118.27.31.188 port 55022 ssh2
Jan  4 05:52:24 legacy sshd[4227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.31.188
Jan  4 05:52:27 legacy sshd[4227]: Failed password for invalid user ecn from 118.27.31.188 port 59016 ssh2
...
2020-01-04 15:50:40
106.13.130.66 attackbotsspam
Invalid user jalila from 106.13.130.66 port 38074
2020-01-04 15:53:10
193.112.123.100 attack
Jan  4 06:43:58 localhost sshd\[13822\]: Invalid user webadmin from 193.112.123.100 port 53036
Jan  4 06:43:58 localhost sshd\[13822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.123.100
Jan  4 06:44:00 localhost sshd\[13822\]: Failed password for invalid user webadmin from 193.112.123.100 port 53036 ssh2
2020-01-04 16:02:59
47.93.112.228 attackspam
Fail2Ban Ban Triggered
2020-01-04 16:15:56
37.252.5.88 attackspam
[portscan] Port scan
2020-01-04 15:49:02
54.90.13.18 attack
$f2bV_matches
2020-01-04 16:17:27
41.249.206.175 attackbotsspam
Automatic report - Port Scan Attack
2020-01-04 15:55:03
115.223.34.97 attackspambots
2020-01-04T06:56:25.234851scmdmz1 sshd[1331]: Invalid user ewi from 115.223.34.97 port 42594
2020-01-04T06:56:25.237479scmdmz1 sshd[1331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.223.34.97
2020-01-04T06:56:25.234851scmdmz1 sshd[1331]: Invalid user ewi from 115.223.34.97 port 42594
2020-01-04T06:56:26.980372scmdmz1 sshd[1331]: Failed password for invalid user ewi from 115.223.34.97 port 42594 ssh2
2020-01-04T06:57:57.549113scmdmz1 sshd[1443]: Invalid user zabbix from 115.223.34.97 port 53612
...
2020-01-04 16:08:12
132.232.1.106 attackbots
Invalid user schedulers from 132.232.1.106 port 38532
2020-01-04 16:19:46
59.93.80.16 attack
ENG,WP GET /wp-login.php
2020-01-04 16:11:22
49.88.112.113 attackbotsspam
Repeated brute force against a port
2020-01-04 16:14:24
60.247.36.100 attackspam
$f2bV_matches
2020-01-04 16:02:43
94.23.50.194 attackspam
SSH Login Bruteforce
2020-01-04 15:52:17

Recently Reported IPs

189.96.62.136 240.240.43.59 220.227.73.224 159.201.11.86
165.79.58.224 169.177.182.119 108.11.117.19 6.59.108.45
190.35.15.44 121.0.210.108 95.196.63.204 70.90.177.13
76.63.69.20 34.20.95.88 119.129.16.1 29.30.93.8
31.152.240.51 238.243.141.66 34.46.218.239 130.182.252.176