Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.29.113.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4933
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.29.113.113.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 22:24:37 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 113.113.29.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 113.113.29.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.176.26.104 attackspam
41258/tcp 42585/tcp 42464/tcp...
[2019-06-14/07-17]3022pkt,584pt.(tcp)
2019-07-17 16:43:20
51.75.207.61 attackbotsspam
Jul 17 04:59:38 plusreed sshd[1599]: Invalid user beauty from 51.75.207.61
...
2019-07-17 17:10:55
64.44.34.119 attackbotsspam
17.07.2019 08:52:50 - SMTP Spam without Auth on hMailserver 
Detected by ELinOX-hMail-A2F
2019-07-17 16:36:07
117.194.92.138 attack
2019-07-17 x@x
2019-07-17 x@x
2019-07-17 x@x
2019-07-17 x@x
2019-07-17 08:42:52 dovecot_plain authenticator failed for (HP-PC) [117.194.92.138]:63076: 535 Incorrect authentication data (set_id=gatis)
2019-07-17 08:42:59 dovecot_login authenticator failed for (HP-PC) [117.194.92.138]:63076: 535 Incorrect authentication data (set_id=gatis)
2019-07-17 08:43:07 dovecot_plain authenticator failed for (HP-PC) [117.194.92.138]:63644: 535 Incorrect authentication data (set_id=gatis)
2019-07-17 08:43:09 dovecot_login authenticator failed for (HP-PC) [117.194.92.138]:63644: 535 Incorrect authentication data (set_id=gatis)
2019-07-17 x@x
2019-07-17 x@x
2019-07-17 x@x
2019-07-17 x@x
2019-07-17 08:43:26 dovecot_plain authenticator failed for (HP-PC) [117.194.92.138]:64739: 535 Incorrect authentication data (set_id=gatis)
2019-07-17 08:43:29 dovecot_login authenticator failed for (HP-PC) [117.194.92.138]:64739: 535 Incorrect authentication data (set_id=gatis)
2019-07-17 08:43:33 dovec........
------------------------------
2019-07-17 17:24:17
193.34.174.104 attackbots
Automatic report - Port Scan Attack
2019-07-17 16:38:44
189.155.72.243 attackspambots
Automatic report - Port Scan Attack
2019-07-17 16:52:22
46.254.245.122 attackbotsspam
17.07.2019 08:09:34 - Login Fail on hMailserver 
Detected by ELinOX-hMail-A2F
2019-07-17 17:22:23
46.41.69.251 attackspam
" "
2019-07-17 17:17:07
188.166.251.87 attack
Jul 17 10:10:51 dev0-dcde-rnet sshd[21045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.251.87
Jul 17 10:10:53 dev0-dcde-rnet sshd[21045]: Failed password for invalid user send from 188.166.251.87 port 48530 ssh2
Jul 17 10:16:21 dev0-dcde-rnet sshd[21056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.251.87
2019-07-17 17:17:35
115.146.121.237 attack
WordPress login Brute force / Web App Attack on client site.
2019-07-17 17:21:36
36.80.82.98 attackspambots
Scanning random ports - tries to find possible vulnerable services
2019-07-17 17:16:15
66.70.130.155 attackbotsspam
Jul 17 04:15:26 TORMINT sshd\[32030\]: Invalid user test from 66.70.130.155
Jul 17 04:15:26 TORMINT sshd\[32030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.130.155
Jul 17 04:15:27 TORMINT sshd\[32030\]: Failed password for invalid user test from 66.70.130.155 port 36012 ssh2
...
2019-07-17 16:34:59
109.73.65.235 attackspam
Jul 17 07:42:47 mxgate1 postfix/postscreen[14130]: CONNECT from [109.73.65.235]:64413 to [176.31.12.44]:25
Jul 17 07:42:47 mxgate1 postfix/dnsblog[14135]: addr 109.73.65.235 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jul 17 07:42:47 mxgate1 postfix/dnsblog[14133]: addr 109.73.65.235 listed by domain b.barracudacentral.org as 127.0.0.2
Jul 17 07:42:53 mxgate1 postfix/postscreen[14130]: DNSBL rank 2 for [109.73.65.235]:64413
Jul x@x
Jul 17 07:42:53 mxgate1 postfix/postscreen[14130]: DISCONNECT [109.73.65.235]:64413


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=109.73.65.235
2019-07-17 17:13:39
176.36.119.166 attackspambots
firewall-block, port(s): 23/tcp
2019-07-17 16:45:12
139.59.56.121 attackbots
Jul 17 10:34:43 srv206 sshd[7581]: Invalid user zebra from 139.59.56.121
Jul 17 10:34:43 srv206 sshd[7581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.121
Jul 17 10:34:43 srv206 sshd[7581]: Invalid user zebra from 139.59.56.121
Jul 17 10:34:44 srv206 sshd[7581]: Failed password for invalid user zebra from 139.59.56.121 port 39112 ssh2
...
2019-07-17 16:46:35

Recently Reported IPs

55.240.252.231 226.224.79.176 48.27.174.201 152.224.38.233
218.183.115.229 73.116.70.107 103.224.160.189 109.182.175.28
20.17.76.124 126.126.213.121 26.99.231.37 175.69.54.151
106.213.217.242 178.144.147.255 136.249.205.142 34.1.32.168
171.144.199.95 205.96.253.33 32.240.56.219 67.153.218.89