Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.29.121.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61322
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.29.121.75.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 20:50:36 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 75.121.29.68.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 75.121.29.68.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
87.103.120.250 attackbotsspam
Dec 30 01:30:04 TORMINT sshd\[20259\]: Invalid user sershar from 87.103.120.250
Dec 30 01:30:04 TORMINT sshd\[20259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.103.120.250
Dec 30 01:30:06 TORMINT sshd\[20259\]: Failed password for invalid user sershar from 87.103.120.250 port 51414 ssh2
...
2019-12-30 14:58:22
45.125.239.234 attack
45.125.239.234 - - \[30/Dec/2019:07:30:57 +0100\] "POST /wp-login.php HTTP/1.0" 200 7544 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
45.125.239.234 - - \[30/Dec/2019:07:31:00 +0100\] "POST /wp-login.php HTTP/1.0" 200 7411 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
45.125.239.234 - - \[30/Dec/2019:07:31:03 +0100\] "POST /wp-login.php HTTP/1.0" 200 7407 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-12-30 15:01:26
217.182.77.186 attack
Dec 30 03:55:14 firewall sshd[3187]: Failed password for invalid user operator from 217.182.77.186 port 43314 ssh2
Dec 30 03:58:19 firewall sshd[3225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.77.186  user=root
Dec 30 03:58:21 firewall sshd[3225]: Failed password for root from 217.182.77.186 port 46182 ssh2
...
2019-12-30 15:20:29
187.189.86.40 attackbots
Dec 30 00:30:54 mailman postfix/smtpd[24815]: warning: fixed-187-189-86-40.totalplay.net[187.189.86.40]: SASL PLAIN authentication failed: authentication failure
2019-12-30 15:21:56
18.194.196.202 attackbots
Time:     Mon Dec 30 03:07:56 2019 -0300
IP:       18.194.196.202 (DE/Germany/ec2-18-194-196-202.eu-central-1.compute.amazonaws.com)
Failures: 5 (mod_security)
Interval: 3600 seconds
Blocked:  Permanent Block
2019-12-30 15:31:03
134.90.149.148 attackbots
0,33-02/03 [bc01/m08] PostRequest-Spammer scoring: paris
2019-12-30 15:24:13
79.188.68.89 attack
Dec 30 01:56:34 plusreed sshd[23501]: Invalid user ftpuser from 79.188.68.89
...
2019-12-30 14:59:10
218.147.191.212 attack
Dec 30 07:30:10 mc1 kernel: \[1846197.032739\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=218.147.191.212 DST=159.69.205.51 LEN=52 TOS=0x00 PREC=0x00 TTL=111 ID=9279 DF PROTO=TCP SPT=56815 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0 
Dec 30 07:30:13 mc1 kernel: \[1846200.111589\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=218.147.191.212 DST=159.69.205.51 LEN=52 TOS=0x00 PREC=0x00 TTL=111 ID=12255 DF PROTO=TCP SPT=56815 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0 
Dec 30 07:30:19 mc1 kernel: \[1846206.202110\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=218.147.191.212 DST=159.69.205.51 LEN=48 TOS=0x00 PREC=0x00 TTL=111 ID=17960 DF PROTO=TCP SPT=56815 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0 
...
2019-12-30 15:12:03
198.98.53.133 attackbotsspam
st-nyc1-01 recorded 3 login violations from 198.98.53.133 and was blocked at 2019-12-30 06:30:02. 198.98.53.133 has been blocked on 0 previous occasions. 198.98.53.133's first attempt was recorded at 2019-12-30 06:30:02
2019-12-30 15:20:56
111.231.215.244 attackbots
Dec 30 07:56:26 vps691689 sshd[18653]: Failed password for sshd from 111.231.215.244 port 15191 ssh2
Dec 30 07:59:23 vps691689 sshd[18687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.215.244
...
2019-12-30 15:25:48
148.70.226.228 attack
Dec 30 07:30:23 v22018086721571380 sshd[12126]: Failed password for invalid user host from 148.70.226.228 port 45496 ssh2
2019-12-30 15:14:38
159.65.164.210 attack
Dec 30 07:30:28 lnxded64 sshd[31064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.164.210
2019-12-30 15:23:06
36.65.196.245 attack
Attempted to connect 3 times to port 80 TCP
2019-12-30 15:30:13
218.92.0.131 attackspambots
Dec 30 07:51:06 icinga sshd[57287]: Failed password for root from 218.92.0.131 port 42108 ssh2
Dec 30 07:51:10 icinga sshd[57287]: Failed password for root from 218.92.0.131 port 42108 ssh2
Dec 30 07:51:13 icinga sshd[57287]: Failed password for root from 218.92.0.131 port 42108 ssh2
Dec 30 07:51:16 icinga sshd[57287]: Failed password for root from 218.92.0.131 port 42108 ssh2
...
2019-12-30 15:12:39
119.29.205.52 attackspambots
Dec 30 08:02:27 [host] sshd[2832]: Invalid user ao from 119.29.205.52
Dec 30 08:02:27 [host] sshd[2832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.205.52
Dec 30 08:02:30 [host] sshd[2832]: Failed password for invalid user ao from 119.29.205.52 port 36428 ssh2
2019-12-30 15:25:18

Recently Reported IPs

241.2.101.123 176.148.212.37 168.61.74.160 95.23.9.144
75.7.184.36 171.84.108.33 143.210.46.202 80.26.201.70
138.117.202.174 17.29.88.155 24.72.12.211 51.110.99.131
109.207.3.52 171.81.56.75 186.58.8.175 115.56.60.207
177.67.161.197 190.116.209.98 12.251.90.194 44.206.127.19