Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.29.149.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45891
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;57.29.149.59.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 06:58:51 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 59.149.29.57.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 59.149.29.57.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
196.65.62.110 attackspam
196.65.62.110 - - [25/Aug/2020:22:00:35 +0200] "GET /wp-admin/vuln.php HTTP/1.1" 404 16980 "-" "Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:28.0) Gecko/20100101 Firefox/28.0"
196.65.62.110 - - [25/Aug/2020:22:00:37 +0200] "GET /wp-admin/vuln.htm HTTP/1.1" 404 16853 "-" "Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:28.0) Gecko/20100101 Firefox/28.0"
196.65.62.110 - - [25/Aug/2020:22:00:38 +0200] "POST //wp-content/plugins/cherry-plugin/admin/import-export/upload.php HTTP/1.1" 403 400 "-" "Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:28.0) Gecko/20100101 Firefox/28.0"
196.65.62.110 - - [25/Aug/2020:22:00:40 +0200] "GET /wp-content/plugins/cherry-plugin/admin/import-export/settings_auto.php HTTP/1.1" 404 17021 "-" "Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:28.0) Gecko/20100101 Firefox/28.0"
196.65.62.110 - - [25/Aug/2020:22:00:45 +0200] "POST //wp-admin/admin-post.php?page=wysija_campaigns&action=theme
...
2020-08-26 05:50:33
134.175.11.167 attack
[ssh] SSH attack
2020-08-26 05:52:50
222.186.175.163 attack
Aug 25 23:44:15 vps1 sshd[18111]: Failed none for invalid user root from 222.186.175.163 port 26932 ssh2
Aug 25 23:44:16 vps1 sshd[18111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163  user=root
Aug 25 23:44:18 vps1 sshd[18111]: Failed password for invalid user root from 222.186.175.163 port 26932 ssh2
Aug 25 23:44:23 vps1 sshd[18111]: Failed password for invalid user root from 222.186.175.163 port 26932 ssh2
Aug 25 23:44:26 vps1 sshd[18111]: Failed password for invalid user root from 222.186.175.163 port 26932 ssh2
Aug 25 23:44:30 vps1 sshd[18111]: Failed password for invalid user root from 222.186.175.163 port 26932 ssh2
Aug 25 23:44:33 vps1 sshd[18111]: Failed password for invalid user root from 222.186.175.163 port 26932 ssh2
Aug 25 23:44:33 vps1 sshd[18111]: error: maximum authentication attempts exceeded for invalid user root from 222.186.175.163 port 26932 ssh2 [preauth]
...
2020-08-26 05:46:27
106.53.127.30 attackbotsspam
Aug 25 06:54:11 serwer sshd\[13661\]: Invalid user team3 from 106.53.127.30 port 43136
Aug 25 06:54:11 serwer sshd\[13661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.127.30
Aug 25 06:54:13 serwer sshd\[13661\]: Failed password for invalid user team3 from 106.53.127.30 port 43136 ssh2
...
2020-08-26 05:48:05
222.186.30.167 attackspambots
Aug 25 21:35:00 ip-172-31-61-156 sshd[5732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.167  user=root
Aug 25 21:35:02 ip-172-31-61-156 sshd[5732]: Failed password for root from 222.186.30.167 port 41185 ssh2
...
2020-08-26 05:35:38
177.66.113.107 attack
Unauthorized connection attempt from IP address 177.66.113.107 on Port 445(SMB)
2020-08-26 05:22:13
60.210.40.210 attackbotsspam
2020-08-25T17:26:20.316919xentho-1 sshd[200299]: Failed password for invalid user ftptest from 60.210.40.210 port 3210 ssh2
2020-08-25T17:27:44.265185xentho-1 sshd[200317]: Invalid user apagar from 60.210.40.210 port 3211
2020-08-25T17:27:44.273247xentho-1 sshd[200317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.210.40.210
2020-08-25T17:27:44.265185xentho-1 sshd[200317]: Invalid user apagar from 60.210.40.210 port 3211
2020-08-25T17:27:46.251717xentho-1 sshd[200317]: Failed password for invalid user apagar from 60.210.40.210 port 3211 ssh2
2020-08-25T17:29:13.080358xentho-1 sshd[200358]: Invalid user vmail from 60.210.40.210 port 3212
2020-08-25T17:29:13.085811xentho-1 sshd[200358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.210.40.210
2020-08-25T17:29:13.080358xentho-1 sshd[200358]: Invalid user vmail from 60.210.40.210 port 3212
2020-08-25T17:29:14.949006xentho-1 sshd[200358]: Failed passw
...
2020-08-26 05:36:15
45.191.62.201 attackspambots
Unauthorized connection attempt from IP address 45.191.62.201 on Port 445(SMB)
2020-08-26 05:43:09
158.69.192.35 attackspambots
detected by Fail2Ban
2020-08-26 05:47:33
58.27.95.2 attackspam
Aug 26 02:12:53 gw1 sshd[4694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.27.95.2
Aug 26 02:12:54 gw1 sshd[4694]: Failed password for invalid user test2 from 58.27.95.2 port 59640 ssh2
...
2020-08-26 05:33:51
94.159.31.10 attackbots
SSH Invalid Login
2020-08-26 05:46:12
121.241.244.92 attackspambots
2020-08-25T21:15:32.109213shield sshd\[4232\]: Invalid user com from 121.241.244.92 port 50563
2020-08-25T21:15:32.132403shield sshd\[4232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.244.92
2020-08-25T21:15:34.630814shield sshd\[4232\]: Failed password for invalid user com from 121.241.244.92 port 50563 ssh2
2020-08-25T21:20:51.690604shield sshd\[5251\]: Invalid user vu from 121.241.244.92 port 46849
2020-08-25T21:20:51.713957shield sshd\[5251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.244.92
2020-08-26 05:28:15
123.59.120.36 attackspam
Aug 25 21:34:14 vps-51d81928 sshd[1241]: Failed password for invalid user ankit from 123.59.120.36 port 15865 ssh2
Aug 25 21:37:49 vps-51d81928 sshd[1317]: Invalid user admin from 123.59.120.36 port 64335
Aug 25 21:37:49 vps-51d81928 sshd[1317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.59.120.36 
Aug 25 21:37:49 vps-51d81928 sshd[1317]: Invalid user admin from 123.59.120.36 port 64335
Aug 25 21:37:52 vps-51d81928 sshd[1317]: Failed password for invalid user admin from 123.59.120.36 port 64335 ssh2
...
2020-08-26 05:41:58
182.254.149.130 attackspambots
SSH Invalid Login
2020-08-26 05:51:48
170.106.3.225 attackspambots
Bruteforce detected by fail2ban
2020-08-26 05:53:44

Recently Reported IPs

24.131.205.184 207.18.187.0 41.131.135.0 238.78.213.86
35.112.43.176 156.244.22.141 235.91.121.42 176.21.172.63
20.124.99.92 230.220.80.255 178.108.147.93 14.227.113.204
209.147.44.140 9.186.135.90 60.114.233.32 113.96.140.129
218.169.7.185 25.177.201.12 106.87.45.119 161.194.29.67