Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Woodbridge

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.29.239.160
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23543
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;54.29.239.160.			IN	A

;; AUTHORITY SECTION:
.			311	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100203 1800 900 604800 86400

;; Query time: 371 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 03 06:53:09 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 160.239.29.54.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 160.239.29.54.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.255.160.51 attackspam
Aug  7 19:50:18 firewall sshd[20679]: Failed password for root from 51.255.160.51 port 48612 ssh2
Aug  7 19:54:17 firewall sshd[20782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.160.51  user=root
Aug  7 19:54:19 firewall sshd[20782]: Failed password for root from 51.255.160.51 port 60054 ssh2
...
2020-08-08 08:10:44
222.186.190.17 attack
Aug  8 02:16:10 alpha sshd[13291]: Unable to negotiate with 222.186.190.17 port 40262: no matching host key type found. Their offer: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth]
Aug  8 02:17:14 alpha sshd[13300]: Unable to negotiate with 222.186.190.17 port 41553: no matching host key type found. Their offer: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth]
Aug  8 02:18:23 alpha sshd[13302]: Unable to negotiate with 222.186.190.17 port 45643: no matching host key type found. Their offer: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth]
2020-08-08 08:30:12
113.31.105.250 attackbotsspam
Aug  8 00:11:52 ns382633 sshd\[7998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.31.105.250  user=root
Aug  8 00:11:54 ns382633 sshd\[7998\]: Failed password for root from 113.31.105.250 port 54986 ssh2
Aug  8 00:36:09 ns382633 sshd\[12405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.31.105.250  user=root
Aug  8 00:36:11 ns382633 sshd\[12405\]: Failed password for root from 113.31.105.250 port 59978 ssh2
Aug  8 00:41:09 ns382633 sshd\[13327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.31.105.250  user=root
2020-08-08 08:07:22
139.99.8.3 attack
Aug  8 05:59:25 b-vps wordpress(gpfans.cz)[3507]: Authentication attempt for unknown user buchtic from 139.99.8.3
...
2020-08-08 12:04:42
145.239.82.192 attack
SSH Brute Force
2020-08-08 08:29:17
195.54.161.59 attack
Multiport scan : 60 ports scanned 33 60 900 3320 4545 6389 8899 9389 9527 9802 11111 24006 24038 24063 24118 24120 24139 24148 24161 24175 24199 24212 24222 24234 24265 24327 24344 24380 24400 24402 24411 24474 24477 24479 24488 24495 24530 24541 24551 24588 24590 24602 24611 24621 24648 24703 24731 24743 24746 24747 24748 24771 24777 24786 24797 24862 24919 24949 24952 24959
2020-08-08 08:25:20
114.80.55.163 attackspam
failed root login
2020-08-08 12:07:10
165.22.31.24 attackbots
165.22.31.24 - - [08/Aug/2020:05:59:22 +0200] "GET /wp-login.php HTTP/1.1" 200 5738 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.31.24 - - [08/Aug/2020:05:59:23 +0200] "POST /wp-login.php HTTP/1.1" 200 6055 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.31.24 - - [08/Aug/2020:05:59:24 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-08 12:05:14
106.13.37.164 attackspam
Too many connections or unauthorized access detected from Arctic banned ip
2020-08-08 08:10:20
34.219.219.149 attackbots
port 25
2020-08-08 08:11:31
162.241.212.169 attackspambots
Port Scan/VNC login attempt
...
2020-08-08 08:03:51
79.54.18.135 attack
Aug  8 06:03:03 cosmoit sshd[15472]: Failed password for root from 79.54.18.135 port 60434 ssh2
2020-08-08 12:07:39
188.166.251.156 attackspam
Aug  8 00:12:10 s1 sshd\[5579\]: User root from 188.166.251.156 not allowed because not listed in AllowUsers
Aug  8 00:12:10 s1 sshd\[5579\]: Failed password for invalid user root from 188.166.251.156 port 41590 ssh2
Aug  8 00:14:01 s1 sshd\[5642\]: User root from 188.166.251.156 not allowed because not listed in AllowUsers
Aug  8 00:14:01 s1 sshd\[5642\]: Failed password for invalid user root from 188.166.251.156 port 41892 ssh2
Aug  8 00:15:57 s1 sshd\[6456\]: User root from 188.166.251.156 not allowed because not listed in AllowUsers
Aug  8 00:15:57 s1 sshd\[6456\]: Failed password for invalid user root from 188.166.251.156 port 42198 ssh2
...
2020-08-08 08:00:57
195.206.105.217 attackbotsspam
xmlrpc attack
2020-08-08 08:00:28
106.51.113.15 attack
Aug  7 22:33:43  sshd\[22951\]: User root from 106.51.113.15 not allowed because not listed in AllowUsersAug  7 22:33:46  sshd\[22951\]: Failed password for invalid user root from 106.51.113.15 port 39723 ssh2
...
2020-08-08 08:26:18

Recently Reported IPs

162.62.227.31 181.229.124.194 125.169.80.65 41.46.234.119
184.171.122.188 189.103.108.91 74.35.42.32 57.72.217.96
64.118.31.135 8.220.166.27 189.103.201.130 130.93.57.237
115.238.229.39 34.12.42.94 110.4.58.96 103.0.12.200
146.248.248.80 102.239.169.127 50.101.236.248 152.3.159.45