Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.117.159.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49364
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;29.117.159.70.			IN	A

;; AUTHORITY SECTION:
.			475	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023102501 1800 900 604800 86400

;; Query time: 89 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 26 09:23:27 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 70.159.117.29.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.159.117.29.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
1.30.54.86 attackbots
Unauthorized connection attempt detected from IP address 1.30.54.86 to port 5555 [T]
2020-01-30 17:43:13
117.94.126.213 attackspam
Unauthorized connection attempt detected from IP address 117.94.126.213 to port 6656 [T]
2020-01-30 17:27:32
183.166.135.203 attackbotsspam
Unauthorized connection attempt detected from IP address 183.166.135.203 to port 6656 [T]
2020-01-30 17:18:30
212.42.122.66 attack
Unauthorized connection attempt detected from IP address 212.42.122.66 to port 21 [T]
2020-01-30 17:18:01
112.85.45.5 attack
Unauthorized connection attempt detected from IP address 112.85.45.5 to port 6656 [T]
2020-01-30 17:35:27
222.186.30.248 attack
2020-1-30 10:14:51 AM: failed ssh attempt
2020-01-30 17:15:13
222.186.30.209 attackbots
Jan 30 10:08:00 localhost sshd\[8533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.209  user=root
Jan 30 10:08:02 localhost sshd\[8533\]: Failed password for root from 222.186.30.209 port 64877 ssh2
Jan 30 10:11:27 localhost sshd\[8848\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.209  user=root
Jan 30 10:11:29 localhost sshd\[8848\]: Failed password for root from 222.186.30.209 port 12801 ssh2
Jan 30 10:11:31 localhost sshd\[8848\]: Failed password for root from 222.186.30.209 port 12801 ssh2
...
2020-01-30 17:16:02
183.80.16.188 attackspam
Unauthorized connection attempt detected from IP address 183.80.16.188 to port 23 [T]
2020-01-30 17:45:58
58.221.236.204 attackspam
Unauthorized connection attempt detected from IP address 58.221.236.204 to port 1433 [T]
2020-01-30 17:40:22
139.199.184.166 attackspambots
Unauthorized connection attempt detected from IP address 139.199.184.166 to port 80 [J]
2020-01-30 17:23:25
39.105.44.153 attack
Unauthorized connection attempt detected from IP address 39.105.44.153 to port 80 [T]
2020-01-30 17:10:41
182.110.116.214 attackspambots
Unauthorized connection attempt detected from IP address 182.110.116.214 to port 6656 [T]
2020-01-30 17:19:56
164.52.24.175 attack
Unauthorized connection attempt detected from IP address 164.52.24.175 to port 2455 [J]
2020-01-30 17:22:23
223.242.246.186 attackbots
Unauthorized connection attempt detected from IP address 223.242.246.186 to port 6656 [T]
2020-01-30 17:13:07
222.186.30.218 attackbots
2020-01-30T04:14:10.810309vostok sshd\[25700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.218  user=root | Triggered by Fail2Ban at Vostok web server
2020-01-30 17:15:34

Recently Reported IPs

201.139.113.13 208.230.22.160 142.63.174.0 140.35.84.30
57.135.234.64 165.190.49.75 88.83.17.245 147.133.1.90
220.85.50.106 13.181.37.103 242.12.245.226 123.75.239.208
212.137.171.204 57.109.9.146 254.80.80.200 161.129.180.245
82.214.56.247 172.24.101.233 12.8.32.160 14.246.126.107