Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.29.195.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35235
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;47.29.195.130.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 05:29:03 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 130.195.29.47.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 47.29.195.130.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
121.46.244.194 attack
Oct  7 05:36:08 *** sshd[1009]: User root from 121.46.244.194 not allowed because not listed in AllowUsers
2020-10-07 13:52:45
122.194.229.37 attackbotsspam
Fail2Ban Ban Triggered (2)
2020-10-07 13:26:05
118.40.139.200 attackspambots
Oct  7 08:56:29 lunarastro sshd[12736]: Failed password for root from 118.40.139.200 port 47902 ssh2
2020-10-07 13:44:02
106.13.34.131 attackbots
Oct  7 02:43:43 santamaria sshd\[24826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.34.131  user=root
Oct  7 02:43:45 santamaria sshd\[24826\]: Failed password for root from 106.13.34.131 port 36518 ssh2
Oct  7 02:47:37 santamaria sshd\[24874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.34.131  user=root
...
2020-10-07 13:09:54
62.210.136.189 attackspambots
Oct  5 16:49:14 hostnameproxy sshd[6564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.136.189  user=r.r
Oct  5 16:49:14 hostnameproxy sshd[6563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.136.189  user=r.r
Oct  5 16:49:14 hostnameproxy sshd[6586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.136.189  user=r.r
Oct  5 16:49:14 hostnameproxy sshd[6592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.136.189  user=r.r
Oct  5 16:49:14 hostnameproxy sshd[6562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.136.189  user=r.r
Oct  5 16:49:14 hostnameproxy sshd[6582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.136.189  user=r.r
Oct  5 16:49:14 hostnameproxy sshd[6585]: pam_unix(sshd........
------------------------------
2020-10-07 13:10:36
51.68.196.163 attackbotsspam
Oct  7 05:24:00 fhem-rasp sshd[13504]: Failed password for root from 51.68.196.163 port 48382 ssh2
Oct  7 05:24:00 fhem-rasp sshd[13504]: Disconnected from authenticating user root 51.68.196.163 port 48382 [preauth]
...
2020-10-07 13:37:06
139.59.228.154 attack
20 attempts against mh-ssh on cloud
2020-10-07 13:23:50
111.207.167.147 attackspambots
" "
2020-10-07 13:20:31
68.183.90.64 attackbotsspam
Automatic report - Banned IP Access
2020-10-07 13:34:38
58.221.204.114 attackbots
SSH login attempts.
2020-10-07 13:36:40
185.252.30.20 attack
2020-10-06T20:44:30Z - RDP login failed multiple times. (185.252.30.20)
2020-10-07 13:25:14
111.229.76.239 attackbots
$f2bV_matches
2020-10-07 13:09:16
157.55.39.175 attackspambots
Automatic report - Banned IP Access
2020-10-07 13:47:32
27.102.114.131 attackbots
SSH login attempts.
2020-10-07 13:13:50
222.186.30.112 attackbots
Oct  7 07:46:16 vm2 sshd[11792]: Failed password for root from 222.186.30.112 port 30380 ssh2
...
2020-10-07 13:48:30

Recently Reported IPs

173.99.154.167 228.248.219.31 186.238.184.74 126.60.127.207
2.99.99.147 25.245.46.206 142.142.84.9 253.202.23.53
94.26.96.174 21.186.196.125 184.171.152.29 143.212.84.253
218.30.82.229 142.26.185.88 82.168.201.22 52.201.9.13
252.39.21.60 237.247.116.241 221.88.110.213 213.199.210.5