Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 173.222.29.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24870
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;173.222.29.242.			IN	A

;; AUTHORITY SECTION:
.			501	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103001 1800 900 604800 86400

;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 31 03:50:02 CST 2019
;; MSG SIZE  rcvd: 118
Host info
242.29.222.173.in-addr.arpa domain name pointer a173-222-29-242.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.29.222.173.in-addr.arpa	name = a173-222-29-242.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
110.78.180.85 attack
1585626881 - 03/31/2020 05:54:41 Host: 110.78.180.85/110.78.180.85 Port: 445 TCP Blocked
2020-03-31 13:06:02
190.147.139.216 attackspam
Mar 31 06:48:18 vps647732 sshd[12660]: Failed password for root from 190.147.139.216 port 45270 ssh2
...
2020-03-31 13:04:14
116.97.204.126 attackbotsspam
1585626859 - 03/31/2020 05:54:19 Host: 116.97.204.126/116.97.204.126 Port: 445 TCP Blocked
2020-03-31 13:27:51
62.4.14.123 attackbotsspam
62.4.14.123 was recorded 5 times by 5 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 5, 10, 71
2020-03-31 13:01:44
112.197.34.91 attackspam
20/3/30@23:54:50: FAIL: Alarm-Network address from=112.197.34.91
20/3/30@23:54:50: FAIL: Alarm-Network address from=112.197.34.91
...
2020-03-31 13:00:34
49.204.80.198 attackbotsspam
2020-03-27 16:56:50 server sshd[23338]: Failed password for invalid user xqi from 49.204.80.198 port 54266 ssh2
2020-03-31 12:55:52
194.180.224.137 attackbots
SSH/22 MH Probe, BF, Hack -
2020-03-31 12:58:25
1.52.154.199 attackbots
Tried to sign in on my account
2020-03-31 13:32:23
134.73.51.12 attackspam
Mar 31 05:27:16 mail.srvfarm.net postfix/smtpd[361760]: NOQUEUE: reject: RCPT from unknown[134.73.51.12]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 31 05:28:14 mail.srvfarm.net postfix/smtpd[381494]: NOQUEUE: reject: RCPT from unknown[134.73.51.12]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 31 05:33:04 mail.srvfarm.net postfix/smtpd[377289]: NOQUEUE: reject: RCPT from unknown[134.73.51.12]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 31 05:33:18 mail.srvfarm.net postfix/smtpd[365658]: NOQUEUE: reject: RCPT from unknown[134.73.51.12]: 450 4.1.8 
2020-03-31 13:36:25
129.28.177.29 attack
Mar 31 05:49:25 srv01 sshd[2815]: Invalid user kdomanski from 129.28.177.29 port 57832
Mar 31 05:49:25 srv01 sshd[2815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.177.29
Mar 31 05:49:25 srv01 sshd[2815]: Invalid user kdomanski from 129.28.177.29 port 57832
Mar 31 05:49:27 srv01 sshd[2815]: Failed password for invalid user kdomanski from 129.28.177.29 port 57832 ssh2
Mar 31 05:55:01 srv01 sshd[3100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.177.29  user=root
Mar 31 05:55:03 srv01 sshd[3100]: Failed password for root from 129.28.177.29 port 59000 ssh2
...
2020-03-31 13:00:05
163.172.178.153 attack
Mar 31 12:06:44 webhost01 sshd[27363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.178.153
Mar 31 12:06:46 webhost01 sshd[27363]: Failed password for invalid user oracle from 163.172.178.153 port 54528 ssh2
...
2020-03-31 13:11:27
117.87.26.26 attackspambots
SpamScore above: 10.0
2020-03-31 13:24:43
51.83.254.34 attackbotsspam
$f2bV_matches
2020-03-31 12:50:49
92.118.38.34 attack
(smtpauth) Failed SMTP AUTH login from 92.118.38.34 (RO/Romania/ip-38-34.ZervDNS): 5 in the last 3600 secs
2020-03-31 12:52:56
113.167.96.249 attackspam
20/3/30@23:54:15: FAIL: Alarm-Network address from=113.167.96.249
...
2020-03-31 13:30:49

Recently Reported IPs

251.29.204.27 7.80.245.189 240.73.132.87 80.37.43.121
116.125.237.89 210.243.47.15 31.86.128.7 254.80.59.242
94.192.113.57 180.125.194.28 229.222.11.24 19.241.115.87
185.106.117.143 200.198.71.123 178.75.76.94 59.107.0.15
73.67.250.86 218.140.25.180 31.57.85.111 176.251.148.123