Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kant

Region: Chuyskaya Oblast'

Country: Kyrgyzstan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.29.19.173
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34367
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;217.29.19.173.			IN	A

;; AUTHORITY SECTION:
.			503	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090601 1800 900 604800 86400

;; Query time: 111 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 07 08:27:12 CST 2020
;; MSG SIZE  rcvd: 117
Host info
173.19.29.217.in-addr.arpa domain name pointer 217-29-19-173.saimanet.kg.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
173.19.29.217.in-addr.arpa	name = 217-29-19-173.saimanet.kg.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
202.83.42.196 attackspam
Mirai and Reaper Exploitation Traffic
2020-09-16 05:35:43
123.206.111.27 attack
Sep 15 19:31:24 ns381471 sshd[4049]: Failed password for root from 123.206.111.27 port 55246 ssh2
2020-09-16 05:36:35
140.143.211.45 attackbots
Sep 15 22:10:28 localhost sshd\[5604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.211.45  user=root
Sep 15 22:10:30 localhost sshd\[5604\]: Failed password for root from 140.143.211.45 port 51634 ssh2
Sep 15 22:13:10 localhost sshd\[5644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.211.45  user=root
Sep 15 22:13:12 localhost sshd\[5644\]: Failed password for root from 140.143.211.45 port 54306 ssh2
Sep 15 22:15:53 localhost sshd\[5869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.211.45  user=root
...
2020-09-16 05:28:59
119.123.56.12 attackbots
Brute force attempt
2020-09-16 05:34:08
220.133.36.112 attack
Invalid user allan from 220.133.36.112 port 40243
2020-09-16 05:12:10
189.112.123.157 attack
Unauthorized connection attempt from IP address 189.112.123.157 on Port 445(SMB)
2020-09-16 04:56:50
223.214.227.15 attackbotsspam
Sep 15 06:19:47 Tower sshd[8162]: refused connect from 222.186.175.151 (222.186.175.151)
Sep 15 10:13:01 Tower sshd[8162]: refused connect from 112.85.42.187 (112.85.42.187)
Sep 15 13:09:34 Tower sshd[8162]: Connection from 223.214.227.15 port 33494 on 192.168.10.220 port 22 rdomain ""
Sep 15 13:09:43 Tower sshd[8162]: Failed password for root from 223.214.227.15 port 33494 ssh2
Sep 15 13:09:44 Tower sshd[8162]: Received disconnect from 223.214.227.15 port 33494:11: Bye Bye [preauth]
Sep 15 13:09:44 Tower sshd[8162]: Disconnected from authenticating user root 223.214.227.15 port 33494 [preauth]
2020-09-16 05:16:45
203.151.146.216 attackbotsspam
"fail2ban match"
2020-09-16 05:04:36
167.172.187.179 attackbotsspam
prod8
...
2020-09-16 04:58:00
115.84.230.66 attackspam
Unauthorized connection attempt from IP address 115.84.230.66 on Port 445(SMB)
2020-09-16 05:13:00
95.187.221.32 attackbots
20/9/15@15:00:59: FAIL: Alarm-Network address from=95.187.221.32
...
2020-09-16 05:13:55
164.90.229.36 attack
Automatic report - Banned IP Access
2020-09-16 05:05:20
193.218.38.9 attack
Sep 15 23:17:25 pve1 sshd[23504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.218.38.9 
Sep 15 23:17:27 pve1 sshd[23504]: Failed password for invalid user oldsr128 from 193.218.38.9 port 45880 ssh2
...
2020-09-16 05:30:15
45.233.244.200 attackspam
Unauthorized connection attempt from IP address 45.233.244.200 on Port 445(SMB)
2020-09-16 05:10:32
189.240.227.73 attackbotsspam
Unauthorized connection attempt from IP address 189.240.227.73 on Port 445(SMB)
2020-09-16 05:17:08

Recently Reported IPs

47.140.43.32 46.160.120.101 196.201.8.127 58.69.16.206
51.75.28.25 219.34.7.208 191.13.170.192 11.189.18.42
151.237.140.72 151.198.76.20 193.175.203.252 83.168.97.84
184.18.22.162 80.106.143.71 180.158.1.21 153.161.194.209
35.230.119.57 175.75.126.21 203.114.192.197 151.242.231.239