Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.170.29.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10825
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.170.29.196.			IN	A

;; AUTHORITY SECTION:
.			412	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122900 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 29 22:16:14 CST 2021
;; MSG SIZE  rcvd: 105
Host info
Host 196.29.170.2.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 196.29.170.2.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
90.93.188.157 attackspambots
Invalid user tech from 90.93.188.157 port 60811
2020-07-26 04:27:21
195.231.81.43 attackbots
Jul 25 22:36:11 ift sshd\[25681\]: Invalid user user_1 from 195.231.81.43Jul 25 22:36:13 ift sshd\[25681\]: Failed password for invalid user user_1 from 195.231.81.43 port 45436 ssh2Jul 25 22:39:55 ift sshd\[26117\]: Invalid user hadoop from 195.231.81.43Jul 25 22:39:58 ift sshd\[26117\]: Failed password for invalid user hadoop from 195.231.81.43 port 59338 ssh2Jul 25 22:43:58 ift sshd\[26784\]: Invalid user pl from 195.231.81.43
...
2020-07-26 04:48:42
192.99.210.162 attackbotsspam
*Port Scan* detected from 192.99.210.162 (NP/Nepal/Province 3/Kathmandu/opnmarket.com). 4 hits in the last 296 seconds
2020-07-26 04:54:06
125.63.116.106 attackspam
Exploited Host.
2020-07-26 04:39:15
98.28.237.0 attackbotsspam
SSH User Authentication Brute Force Attempt , PTR: cpe-98-28-237-0.cinci.res.rr.com.
2020-07-26 04:30:44
5.249.145.208 attackbots
Invalid user sl from 5.249.145.208 port 48192
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.145.208
Invalid user sl from 5.249.145.208 port 48192
Failed password for invalid user sl from 5.249.145.208 port 48192 ssh2
Invalid user user from 5.249.145.208 port 33354
2020-07-26 04:53:20
125.212.203.113 attackbotsspam
Jul 25 21:59:42 piServer sshd[19783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.203.113 
Jul 25 21:59:44 piServer sshd[19783]: Failed password for invalid user brendan from 125.212.203.113 port 47036 ssh2
Jul 25 22:04:27 piServer sshd[20239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.203.113 
...
2020-07-26 04:45:43
125.133.35.24 attackspambots
Exploited Host.
2020-07-26 04:58:20
125.124.117.226 attackspam
firewall-block, port(s): 32523/tcp
2020-07-26 05:02:55
118.25.82.219 attackspambots
"fail2ban match"
2020-07-26 04:31:33
218.92.0.249 attackspambots
Jul 25 22:25:09 vps647732 sshd[17254]: Failed password for root from 218.92.0.249 port 27833 ssh2
Jul 25 22:25:22 vps647732 sshd[17254]: error: maximum authentication attempts exceeded for root from 218.92.0.249 port 27833 ssh2 [preauth]
...
2020-07-26 04:28:23
125.215.207.40 attackbotsspam
Failed password for invalid user admin from 125.215.207.40 port 60456 ssh2
2020-07-26 04:43:32
112.85.42.176 attack
Jul 25 22:56:46 santamaria sshd\[5494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
Jul 25 22:56:48 santamaria sshd\[5494\]: Failed password for root from 112.85.42.176 port 40538 ssh2
Jul 25 22:57:05 santamaria sshd\[5496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
...
2020-07-26 05:05:47
45.188.82.229 attackbots
D-Link DAP-1860 Remote Command Injection Vulnerability, PTR: PTR record not found
2020-07-26 04:43:54
196.17.238.91 attackbotsspam
Automatic report - Banned IP Access
2020-07-26 05:00:10

Recently Reported IPs

128.119.181.150 7.64.194.125 104.212.77.170 116.179.32.154
38.28.98.77 187.47.71.166 158.180.6.164 41.224.63.104
182.25.119.238 51.214.170.233 227.204.21.204 119.108.155.244
94.107.42.153 64.77.88.27 2.186.11.4 11.107.174.20
199.70.72.63 225.140.104.205 224.89.164.211 158.169.192.98