Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Ireland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.205.29.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58695
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;57.205.29.94.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:10:02 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 94.29.205.57.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 94.29.205.57.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
219.142.22.66 attackbots
Mar 31 05:51:43 ns381471 sshd[10050]: Failed password for root from 219.142.22.66 port 15449 ssh2
2020-03-31 12:30:20
50.34.121.209 attack
port
2020-03-31 12:40:47
77.158.71.118 attack
Mar 31 05:58:07 [HOSTNAME] sshd[22082]: Invalid user test from 77.158.71.118 port 48892
Mar 31 05:58:07 [HOSTNAME] sshd[22082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.158.71.118
Mar 31 05:58:09 [HOSTNAME] sshd[22082]: Failed password for invalid user test from 77.158.71.118 port 48892 ssh2
...
2020-03-31 12:16:42
37.59.58.142 attackbots
Mar 31 05:55:49 plex sshd[27697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.58.142  user=root
Mar 31 05:55:51 plex sshd[27697]: Failed password for root from 37.59.58.142 port 45850 ssh2
2020-03-31 12:15:43
5.157.15.136 attackbotsspam
Unauthorized access detected from black listed ip!
2020-03-31 12:27:07
185.156.73.60 attackbotsspam
03/30/2020-23:55:22.576178 185.156.73.60 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-31 12:37:04
175.164.130.133 attackbotsspam
Lines containing failures of 175.164.130.133
Mar 31 03:12:36 siirappi sshd[18414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.164.130.133  user=r.r
Mar 31 03:12:37 siirappi sshd[18414]: Failed password for r.r from 175.164.130.133 port 34801 ssh2
Mar 31 03:12:41 siirappi sshd[18414]: Received disconnect from 175.164.130.133 port 34801:11: Bye Bye [preauth]
Mar 31 03:12:41 siirappi sshd[18414]: Disconnected from authenticating user r.r 175.164.130.133 port 34801 [preauth]
Mar 31 03:19:12 siirappi sshd[18439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.164.130.133  user=r.r
Mar 31 03:19:14 siirappi sshd[18439]: Failed password for r.r from 175.164.130.133 port 38973 ssh2
Mar 31 03:19:14 siirappi sshd[18439]: Received disconnect from 175.164.130.133 port 38973:11: Bye Bye [preauth]
Mar 31 03:19:14 siirappi sshd[18439]: Disconnected from authenticating user r.r 175.164.130.133 p........
------------------------------
2020-03-31 12:25:55
134.209.41.198 attackbots
(sshd) Failed SSH login from 134.209.41.198 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 31 05:49:16 amsweb01 sshd[3091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.41.198  user=root
Mar 31 05:49:19 amsweb01 sshd[3091]: Failed password for root from 134.209.41.198 port 43668 ssh2
Mar 31 05:56:14 amsweb01 sshd[3874]: Invalid user map from 134.209.41.198 port 43134
Mar 31 05:56:16 amsweb01 sshd[3874]: Failed password for invalid user map from 134.209.41.198 port 43134 ssh2
Mar 31 06:00:00 amsweb01 sshd[4384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.41.198  user=root
2020-03-31 12:49:39
111.231.87.172 attack
Mar 31 05:46:40 MainVPS sshd[18214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.87.172  user=root
Mar 31 05:46:43 MainVPS sshd[18214]: Failed password for root from 111.231.87.172 port 51614 ssh2
Mar 31 05:53:18 MainVPS sshd[31215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.87.172  user=root
Mar 31 05:53:20 MainVPS sshd[31215]: Failed password for root from 111.231.87.172 port 59088 ssh2
Mar 31 05:55:29 MainVPS sshd[3637]: Invalid user ap from 111.231.87.172 port 51976
...
2020-03-31 12:32:21
218.240.137.68 attack
Mar 30 22:06:44 server1 sshd\[1613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.240.137.68  user=root
Mar 30 22:06:46 server1 sshd\[1613\]: Failed password for root from 218.240.137.68 port 30461 ssh2
Mar 30 22:10:29 server1 sshd\[2784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.240.137.68  user=root
Mar 30 22:10:32 server1 sshd\[2784\]: Failed password for root from 218.240.137.68 port 27090 ssh2
Mar 30 22:14:21 server1 sshd\[3944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.240.137.68  user=root
...
2020-03-31 12:26:22
116.237.76.200 attack
Mar 31 00:49:20 ws19vmsma01 sshd[236931]: Failed password for root from 116.237.76.200 port 42470 ssh2
Mar 31 00:55:18 ws19vmsma01 sshd[244051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.237.76.200
...
2020-03-31 12:42:10
140.238.145.45 attackbotsspam
(sshd) Failed SSH login from 140.238.145.45 (US/United States/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 31 05:55:42 ubnt-55d23 sshd[25426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.238.145.45  user=root
Mar 31 05:55:45 ubnt-55d23 sshd[25426]: Failed password for root from 140.238.145.45 port 45360 ssh2
2020-03-31 12:17:34
223.205.164.58 attack
20/3/30@23:55:26: FAIL: Alarm-Network address from=223.205.164.58
20/3/30@23:55:26: FAIL: Alarm-Network address from=223.205.164.58
...
2020-03-31 12:34:34
183.88.11.150 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 31-03-2020 04:55:19.
2020-03-31 12:39:49
213.91.179.246 attackbots
fail2ban
2020-03-31 12:09:47

Recently Reported IPs

36.39.148.24 219.87.50.63 152.227.103.55 155.224.183.191
216.74.38.62 212.129.98.80 233.156.28.63 80.104.234.47
67.242.162.241 209.245.192.194 222.169.138.79 8.74.14.131
144.132.22.41 141.83.26.176 237.86.57.249 34.45.196.138
89.222.233.30 174.226.99.51 24.79.246.120 146.145.81.161