Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.22.1.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51532
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;29.22.1.212.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 01:57:24 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 212.1.22.29.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 212.1.22.29.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
212.154.90.203 attack
Unauthorized connection attempt detected from IP address 212.154.90.203 to port 23
2019-12-29 08:02:14
45.136.108.124 attackbots
Dec 28 23:35:13 h2177944 kernel: \[771204.157456\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.124 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=51040 PROTO=TCP SPT=59102 DPT=8160 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 28 23:35:13 h2177944 kernel: \[771204.157471\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.124 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=51040 PROTO=TCP SPT=59102 DPT=8160 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 29 00:05:06 h2177944 kernel: \[772996.792283\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.124 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=16038 PROTO=TCP SPT=59102 DPT=8273 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 29 00:05:06 h2177944 kernel: \[772996.792297\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.124 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=16038 PROTO=TCP SPT=59102 DPT=8273 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 29 00:12:41 h2177944 kernel: \[773451.369634\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.108.124 DST=85.214.117.9
2019-12-29 07:35:52
200.204.162.194 attackspambots
Unauthorized connection attempt detected from IP address 200.204.162.194 to port 8081
2019-12-29 08:04:02
116.55.248.214 attackspam
Triggered by Fail2Ban at Vostok web server
2019-12-29 07:58:08
50.62.208.92 attack
Automatic report - XMLRPC Attack
2019-12-29 07:51:31
128.199.114.0 attackspambots
Automatic report - XMLRPC Attack
2019-12-29 07:27:24
125.124.91.206 attackspam
Dec 28 22:35:57 h2177944 sshd\[20030\]: Failed password for invalid user guest from 125.124.91.206 port 43558 ssh2
Dec 28 23:36:56 h2177944 sshd\[22523\]: Invalid user admin from 125.124.91.206 port 56626
Dec 28 23:36:56 h2177944 sshd\[22523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.91.206
Dec 28 23:36:58 h2177944 sshd\[22523\]: Failed password for invalid user admin from 125.124.91.206 port 56626 ssh2
...
2019-12-29 07:36:42
200.81.163.204 attackspam
Unauthorized connection attempt detected from IP address 200.81.163.204 to port 5358
2019-12-29 08:04:33
192.241.148.219 attackspambots
Scanning unused Default website or suspicious access to valid sites from IP marked as abusive
2019-12-29 07:51:01
157.245.184.146 attack
RDP Brute-Force (Grieskirchen RZ1)
2019-12-29 07:40:24
128.199.209.14 attackbots
Dec 29 00:39:23 mout sshd[32539]: Invalid user iguico from 128.199.209.14 port 50960
2019-12-29 07:54:12
220.84.22.154 attackspambots
Unauthorized connection attempt detected from IP address 220.84.22.154 to port 9000
2019-12-29 08:00:56
64.71.32.69 attackspambots
Automatic report - XMLRPC Attack
2019-12-29 07:42:53
106.12.16.179 attackbots
Dec 29 00:38:21 MK-Soft-VM8 sshd[530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.179 
Dec 29 00:38:23 MK-Soft-VM8 sshd[530]: Failed password for invalid user carlen from 106.12.16.179 port 40080 ssh2
...
2019-12-29 07:44:06
115.160.255.45 attackspambots
Invalid user melvin from 115.160.255.45 port 12163
2019-12-29 07:53:32

Recently Reported IPs

176.59.88.109 233.0.8.244 34.105.102.9 250.25.201.28
234.178.241.220 228.114.204.27 237.115.226.14 174.199.223.223
163.21.86.244 235.198.167.76 66.249.79.220 214.71.172.88
109.65.14.100 76.2.0.113 91.71.229.74 133.253.114.119
80.87.115.3 227.210.32.217 82.232.205.226 161.133.71.8