Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
194.29.227.146 attack
spam
2020-01-10 21:02:57
194.29.215.199 attackspam
slow and persistent scanner
2019-10-29 17:42:12
194.29.211.132 attack
slow and persistent scanner
2019-10-29 08:13:07
194.29.212.179 attackbots
slow and persistent scanner
2019-10-29 01:07:53
194.29.208.104 attackbotsspam
slow and persistent scanner
2019-10-28 22:21:28
194.29.214.191 attackspambots
slow and persistent scanner
2019-10-28 21:51:40
194.29.212.252 attackbots
slow and persistent scanner
2019-10-28 19:02:03
194.29.212.143 attack
slow and persistent scanner
2019-10-28 18:45:31
194.29.211.119 attack
slow and persistent scanner
2019-10-28 18:06:06
194.29.210.15 attackbotsspam
slow and persistent scanner
2019-10-28 16:15:54
194.29.212.105 attackbots
slow and persistent scanner
2019-10-28 15:09:44
194.29.209.214 attackbotsspam
Unauthorized SSH login attempts
2019-10-27 20:38:30
194.29.208.124 attackbots
ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak
2019-10-27 07:02:45
194.29.208.202 attackbots
TCP connect flood, port scan (port 80/TCP or 443/TCP or 22/TCP).
Date: 2019 Oct 26. 17:20:02
Source IP: 194.29.208.202

Details:
2019 Oct 26 17:20:02 - TCP Connection warning: 101 connections from same ip address (194.29.208.202)
2019 Oct 26 17:20:19 - TCP Connection warning: 138 connections from same ip address (194.29.208.202)
2019 Oct 26 17:30:32 - TCP Connection warning: 110 connections from same ip address (194.29.208.202)
2019 Oct 26 17:35:12 - TCP Connection warning: 179 connections from same ip address (194.29.208.202)
2019-10-27 07:02:24
194.29.209.214 attackspam
TCP connect flood, port scan (port 80/TCP or 443/TCP or 22/TCP).
Date: 2019 Oct 26. 17:15:41
Source IP: 194.29.209.214

Details:
2019 Oct 26 17:15:41 - TCP Connection warning: 128 connections from same ip address (194.29.209.214)
2019 Oct 26 17:20:19 - TCP Connection warning: 157 connections from same ip address (194.29.209.214)
2019 Oct 26 17:30:32 - TCP Connection warning: 211 connections from same ip address (194.29.209.214)
2019 Oct 26 17:35:12 - TCP Connection warning: 118 connections from same ip address (194.29.209.214)
2019-10-27 07:01:54
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.29.2.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44756
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;194.29.2.222.			IN	A

;; AUTHORITY SECTION:
.			401	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110200 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 02 22:07:32 CST 2019
;; MSG SIZE  rcvd: 116
Host info
222.2.29.194.in-addr.arpa domain name pointer 194-29-2-222.static.cablecom.ch.
Nslookup info:
Server:		100.100.2.136
Address:	100.100.2.136#53

Non-authoritative answer:
222.2.29.194.in-addr.arpa	name = 194-29-2-222.static.cablecom.ch.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
184.105.139.81 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-08-20 18:38:18
35.162.68.126 attack
2 Attack(s) Detected
[DoS Attack: Ping Sweep] from source: 35.162.68.126, Tuesday, August 18, 2020 10:14:10

[DoS Attack: Ping Sweep] from source: 35.162.68.126, Tuesday, August 18, 2020 07:24:15
2020-08-20 18:27:52
34.220.179.76 attackspam
1 Attack(s) Detected
[DoS Attack: Ping Sweep] from source: 34.220.179.76, Tuesday, August 18, 2020 10:19:05
2020-08-20 18:28:34
211.22.158.74 attackbotsspam
1 Attack(s) Detected
[DoS Attack: Ping Sweep] from source: 211.22.158.74, Tuesday, August 18, 2020 18:19:20
2020-08-20 18:33:13
52.81.198.255 attackbotsspam
ICMP MH Probe, Scan /Distributed -
2020-08-20 18:24:17
213.230.107.202 attackspam
Aug 20 10:42:27 haigwepa sshd[5334]: Failed password for root from 213.230.107.202 port 64570 ssh2
...
2020-08-20 19:00:32
201.223.91.176 attackspam
1 Attack(s) Detected
[DoS Attack: Ping Sweep] from source: 201.223.91.176, Wednesday, August 19, 2020 00:50:42
2020-08-20 18:34:32
3.15.236.135 attack
1 Attack(s) Detected
[DoS Attack: Ping Sweep] from source: 3.15.236.135, Tuesday, August 18, 2020 05:34:24
2020-08-20 18:54:15
45.87.167.22 attackbots
1 Attack(s) Detected
[DoS Attack: Ping Sweep] from source: 45.87.167.22, Tuesday, August 18, 2020 21:06:09
2020-08-20 18:49:09
3.211.221.235 attackspambots
 TCP (RST) 3.211.221.235:22006 -> port 43837, len 40
2020-08-20 18:53:19
103.134.148.177 attack
 TCP (SYN,ACK) 103.134.148.177:80 -> port 53859, len 44
2020-08-20 18:44:14
13.127.246.7 attackspam
2 Attack(s) Detected
[DoS Attack: Ping Sweep] from source: 13.127.246.7, Tuesday, August 18, 2020 10:13:15

[DoS Attack: Ping Sweep] from source: 13.127.246.7, Tuesday, August 18, 2020 10:07:59
2020-08-20 18:30:31
149.56.17.122 attackspam
1 Attack(s) Detected
[DoS Attack: SYN/ACK Scan] from source: 149.56.17.122, port 443, Tuesday, August 18, 2020 08:42:00
2020-08-20 18:41:04
54.245.74.27 attackbots
1 Attack(s) Detected
[DoS Attack: ACK Scan] from source: 54.245.74.27, port 31000, Tuesday, August 18, 2020 16:00:11
2020-08-20 18:23:11
184.105.139.113 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-08-20 18:37:34

Recently Reported IPs

183.42.245.187 74.217.227.225 6.220.19.139 133.237.136.32
31.188.210.34 189.69.34.230 107.251.193.16 88.48.61.158
71.198.107.172 120.41.249.221 232.117.50.218 63.220.70.142
45.14.240.77 135.5.29.187 77.55.235.226 106.178.120.219
190.82.124.245 208.20.254.105 184.56.58.73 168.253.113.92