Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.29.70.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51848
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.29.70.217.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 02:46:17 CST 2025
;; MSG SIZE  rcvd: 105
Host info
b'Host 217.70.29.55.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 55.29.70.217.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
77.81.230.143 attackbots
Automatic report - Banned IP Access
2019-10-25 03:01:46
61.92.14.168 attackbots
Invalid user zimbra from 61.92.14.168 port 60782
2019-10-25 03:02:50
79.58.50.145 attack
Invalid user user from 79.58.50.145 port 59456
2019-10-25 03:00:53
187.72.125.226 attackspam
Invalid user jboss from 187.72.125.226 port 56958
2019-10-25 03:15:11
203.110.166.51 attack
reported_by_cryptodad
2019-10-25 02:33:49
80.211.180.23 attackbots
Invalid user usuario from 80.211.180.23 port 60178
2019-10-25 03:00:09
99.108.141.4 attackbots
2019-10-24T06:20:26.1878831495-001 sshd\[59227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=99-108-141-4.lightspeed.sntcca.sbcglobal.net  user=root
2019-10-24T06:20:28.8444361495-001 sshd\[59227\]: Failed password for root from 99.108.141.4 port 38732 ssh2
2019-10-24T06:40:30.2845151495-001 sshd\[60000\]: Invalid user team from 99.108.141.4 port 50312
2019-10-24T06:40:30.2875631495-001 sshd\[60000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=99-108-141-4.lightspeed.sntcca.sbcglobal.net
2019-10-24T06:40:32.5515131495-001 sshd\[60000\]: Failed password for invalid user team from 99.108.141.4 port 50312 ssh2
2019-10-24T06:44:39.5983391495-001 sshd\[60155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=99-108-141-4.lightspeed.sntcca.sbcglobal.net  user=root
2019-10-24T06:44:41.6805701495-001 sshd\[60155\]: Failed password for root from 99.108.141.4
...
2019-10-25 02:57:41
118.25.156.20 attack
Invalid user ftpuser from 118.25.156.20 port 52628
2019-10-25 02:52:25
202.88.241.107 attackspambots
Invalid user ubuntu from 202.88.241.107 port 48544
2019-10-25 02:34:25
8.209.73.223 attack
Invalid user elise from 8.209.73.223 port 46996
2019-10-25 03:10:34
119.147.88.77 attackspambots
Invalid user usuario from 119.147.88.77 port 35470
2019-10-25 02:51:22
106.252.169.48 attackspambots
Invalid user admin from 106.252.169.48 port 37851
2019-10-25 02:54:39
152.136.102.131 attack
Invalid user anthony from 152.136.102.131 port 55776
2019-10-25 02:46:14
104.248.115.231 attack
Invalid user usuario from 104.248.115.231 port 58726
2019-10-25 02:56:28
202.163.126.134 attack
Invalid user temp from 202.163.126.134 port 40914
2019-10-25 03:14:38

Recently Reported IPs

47.64.246.196 228.254.18.184 2.116.120.60 145.115.208.172
153.137.12.67 231.152.125.82 168.150.48.88 160.157.80.91
216.20.193.12 44.181.168.144 103.45.84.231 33.164.207.86
98.88.186.217 71.138.108.62 46.159.196.0 188.157.208.203
156.201.203.174 51.41.151.27 175.41.59.17 50.203.47.118