Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aberdeen

Region: Scotland

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.29.74.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11349
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.29.74.66.			IN	A

;; AUTHORITY SECTION:
.			525	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120402 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 05 03:56:33 CST 2019
;; MSG SIZE  rcvd: 114
Host info
Host 66.74.29.2.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.74.29.2.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
119.29.3.45 attack
May 23 12:10:16 mockhub sshd[27003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.3.45
May 23 12:10:18 mockhub sshd[27003]: Failed password for invalid user qqm from 119.29.3.45 port 50695 ssh2
...
2020-05-24 03:20:51
129.204.125.51 attack
Invalid user dzy from 129.204.125.51 port 56356
2020-05-24 02:49:33
167.172.32.22 attackbots
Invalid user upload from 167.172.32.22 port 58562
2020-05-24 03:13:02
222.218.130.213 attack
Invalid user admin from 222.218.130.213 port 58873
2020-05-24 03:06:04
123.31.41.20 attack
Invalid user fcp from 123.31.41.20 port 43298
2020-05-24 02:49:59
188.254.0.183 attack
May 23 14:55:59 server sshd[54285]: Failed password for invalid user fsv from 188.254.0.183 port 49234 ssh2
May 23 15:01:06 server sshd[58679]: Failed password for invalid user clog from 188.254.0.183 port 54134 ssh2
May 23 15:06:13 server sshd[62979]: Failed password for invalid user bfe from 188.254.0.183 port 59034 ssh2
2020-05-24 02:42:15
151.80.155.98 attackbots
Invalid user bhp from 151.80.155.98 port 50222
2020-05-24 03:15:07
120.86.179.233 attackspam
Invalid user wpf from 120.86.179.233 port 52706
2020-05-24 03:19:37
82.165.100.56 attackspambots
May 23 20:15:14 lnxded64 sshd[29929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.165.100.56
2020-05-24 02:56:29
180.76.176.126 attackspam
Invalid user aaf from 180.76.176.126 port 49704
2020-05-24 03:11:08
42.114.200.248 attackspambots
Invalid user avanthi from 42.114.200.248 port 23110
2020-05-24 03:03:39
138.68.82.194 attack
Fail2Ban Ban Triggered
2020-05-24 02:48:52
120.71.147.93 attackbotsspam
Invalid user songch from 120.71.147.93 port 33361
2020-05-24 02:50:47
220.132.75.140 attackspam
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-05-24 03:06:38
122.51.178.207 attack
Invalid user yslee from 122.51.178.207 port 36650
2020-05-24 03:19:21

Recently Reported IPs

217.248.194.221 110.88.57.254 201.105.94.74 216.121.49.244
35.231.215.178 117.208.16.209 182.48.211.202 191.59.187.81
114.191.3.157 46.135.86.56 35.243.73.92 83.199.207.141
180.106.197.15 113.133.33.248 168.18.229.151 5.94.83.61
79.112.86.71 156.236.92.57 39.220.159.18 220.221.47.214