Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Malaysia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.124.99.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23555
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.124.99.29.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 11:20:22 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 29.99.124.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 29.99.124.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
151.70.39.105 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/151.70.39.105/ 
 
 IT - 1H : (92)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IT 
 NAME ASN : ASN1267 
 
 IP : 151.70.39.105 
 
 CIDR : 151.70.0.0/16 
 
 PREFIX COUNT : 161 
 
 UNIQUE IP COUNT : 6032640 
 
 
 ATTACKS DETECTED ASN1267 :  
  1H - 2 
  3H - 5 
  6H - 5 
 12H - 6 
 24H - 17 
 
 DateTime : 2019-10-20 05:51:24 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-20 16:22:01
104.237.240.6 attack
SMB Server BruteForce Attack
2019-10-20 16:20:19
117.48.208.71 attack
Oct 20 06:59:25 site3 sshd\[121807\]: Invalid user spamfilter from 117.48.208.71
Oct 20 06:59:25 site3 sshd\[121807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.208.71
Oct 20 06:59:26 site3 sshd\[121807\]: Failed password for invalid user spamfilter from 117.48.208.71 port 57614 ssh2
Oct 20 07:04:53 site3 sshd\[121926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.208.71  user=root
Oct 20 07:04:55 site3 sshd\[121926\]: Failed password for root from 117.48.208.71 port 38656 ssh2
...
2019-10-20 16:21:06
62.63.237.141 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-10-20 16:06:13
113.246.66.69 attackspambots
Automatic report - Port Scan Attack
2019-10-20 16:08:02
94.176.77.55 attack
(Oct 20)  LEN=40 TTL=244 ID=33325 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 20)  LEN=40 TTL=244 ID=15122 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 20)  LEN=40 TTL=244 ID=19442 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 20)  LEN=40 TTL=244 ID=16842 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 20)  LEN=40 TTL=244 ID=20403 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 20)  LEN=40 TTL=244 ID=6296 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 19)  LEN=40 TTL=244 ID=50071 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 19)  LEN=40 TTL=244 ID=18812 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 19)  LEN=40 TTL=244 ID=23251 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 19)  LEN=40 TTL=244 ID=24073 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 19)  LEN=40 TTL=244 ID=26413 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 19)  LEN=40 TTL=244 ID=19546 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 19)  LEN=40 TTL=244 ID=14633 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 19)  LEN=40 TTL=244 ID=29593 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 19)  LEN=40 TTL=244 ID=63404 DF TCP DPT=23 WINDOW=14600 S...
2019-10-20 16:28:51
182.61.41.203 attackspambots
Oct 20 04:13:38 XXX sshd[31488]: Invalid user American from 182.61.41.203 port 50486
2019-10-20 16:07:05
185.243.180.38 attackbotsspam
Sat, 19 Oct 2019 22:06:34 -0400 Received: from [185.243.180.38] (port=30596 helo=donorpoint.best) From:   Drone-X Pro spam
2019-10-20 16:18:14
139.59.140.65 attackspambots
...
2019-10-20 15:54:30
159.203.197.144 attackbots
Unauthorized SSH login attempts
2019-10-20 16:34:42
58.19.210.10 attack
Oct 20 10:24:07 SilenceServices sshd[32383]: Failed password for root from 58.19.210.10 port 60149 ssh2
Oct 20 10:27:48 SilenceServices sshd[911]: Failed password for root from 58.19.210.10 port 7778 ssh2
2019-10-20 16:32:29
61.133.232.249 attack
2019-10-20T06:21:43.765154abusebot-5.cloudsearch.cf sshd\[16784\]: Invalid user cyrus from 61.133.232.249 port 43244
2019-10-20 15:57:40
162.255.116.68 attackbots
Automatic report - Banned IP Access
2019-10-20 16:33:47
106.51.72.240 attackspam
Invalid user kp from 106.51.72.240 port 41696
2019-10-20 16:13:25
222.186.190.92 attackspam
Oct 20 08:25:20 marvibiene sshd[12481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.92  user=root
Oct 20 08:25:23 marvibiene sshd[12481]: Failed password for root from 222.186.190.92 port 25476 ssh2
Oct 20 08:25:27 marvibiene sshd[12481]: Failed password for root from 222.186.190.92 port 25476 ssh2
Oct 20 08:25:20 marvibiene sshd[12481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.92  user=root
Oct 20 08:25:23 marvibiene sshd[12481]: Failed password for root from 222.186.190.92 port 25476 ssh2
Oct 20 08:25:27 marvibiene sshd[12481]: Failed password for root from 222.186.190.92 port 25476 ssh2
...
2019-10-20 16:31:31

Recently Reported IPs

115.96.5.173 109.4.215.75 203.139.255.132 152.21.92.105
28.190.95.195 195.77.40.130 203.107.106.134 90.119.81.160
122.148.171.247 22.6.27.175 114.55.230.237 47.14.255.191
166.138.74.4 92.12.128.224 146.162.218.85 38.149.130.198
87.148.94.192 155.115.108.221 252.239.57.45 226.213.110.149