Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 244.66.29.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3438
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;244.66.29.38.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 07:31:45 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 38.29.66.244.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 38.29.66.244.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.247.42.234 attackspambots
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2019-07-05 18:20:02
188.166.91.49 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-05 18:28:22
51.9.222.89 attackspam
Honeypot attack, port: 23, PTR: 89.222.9.51.dyn.plus.net.
2019-07-05 18:31:32
118.200.199.43 attackspambots
Jul  5 11:21:17 mail sshd\[21300\]: Failed password for invalid user www from 118.200.199.43 port 34552 ssh2
Jul  5 11:39:59 mail sshd\[21495\]: Invalid user cui from 118.200.199.43 port 60622
...
2019-07-05 18:41:58
117.211.161.42 attackbotsspam
SSH-bruteforce attempts
2019-07-05 19:02:23
220.133.54.68 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-05 18:57:38
198.245.50.81 attackspam
Jul  5 09:58:06 MainVPS sshd[4720]: Invalid user smb from 198.245.50.81 port 45122
Jul  5 09:58:06 MainVPS sshd[4720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.50.81
Jul  5 09:58:06 MainVPS sshd[4720]: Invalid user smb from 198.245.50.81 port 45122
Jul  5 09:58:08 MainVPS sshd[4720]: Failed password for invalid user smb from 198.245.50.81 port 45122 ssh2
Jul  5 10:01:27 MainVPS sshd[4941]: Invalid user doku from 198.245.50.81 port 56866
...
2019-07-05 18:50:33
180.92.233.34 attackbots
Jul  5 08:01:23   TCP Attack: SRC=180.92.233.34 DST=[Masked] LEN=244 TOS=0x00 PREC=0x00 TTL=50  DF PROTO=TCP SPT=36044 DPT=80 WINDOW=457 RES=0x00 ACK PSH URGP=0
2019-07-05 18:52:14
183.82.137.125 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 19:21:07,338 INFO [shellcode_manager] (183.82.137.125) no match, writing hexdump (5fca97e40542a5ed6b3b41726d331d65 :2257002) - MS17010 (EternalBlue)
2019-07-05 18:13:53
61.175.220.59 attackbots
Scanning and Vuln Attempts
2019-07-05 18:48:10
60.195.249.207 attack
Scanning and Vuln Attempts
2019-07-05 18:57:04
66.70.173.61 attack
Scanning and Vuln Attempts
2019-07-05 18:23:55
113.9.144.26 attackbots
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-05 18:21:31
132.232.116.82 attackbotsspam
Repeated brute force against a port
2019-07-05 18:53:16
117.131.119.111 attack
k+ssh-bruteforce
2019-07-05 18:59:16

Recently Reported IPs

196.249.3.57 167.128.128.155 88.10.165.32 172.91.25.205
78.223.155.220 131.34.86.128 50.167.15.42 179.216.69.56
80.55.253.77 180.237.9.148 145.248.227.200 220.144.169.69
250.220.68.146 201.37.233.157 69.3.0.88 143.197.213.56
214.47.67.68 134.240.182.26 237.240.201.93 131.150.48.50