Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 79.29.55.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9633
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;79.29.55.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030800 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 08 18:16:02 CST 2025
;; MSG SIZE  rcvd: 103
Host info
2.55.29.79.in-addr.arpa domain name pointer host-79-29-55-2.business.telecomitalia.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
2.55.29.79.in-addr.arpa	name = host-79-29-55-2.business.telecomitalia.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
200.160.111.44 attackbotsspam
Jun  6 16:35:42 hosting sshd[22216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.160.111.44  user=root
Jun  6 16:35:44 hosting sshd[22216]: Failed password for root from 200.160.111.44 port 37944 ssh2
...
2020-06-06 21:53:37
183.88.42.78 attackspambots
1591446789 - 06/06/2020 14:33:09 Host: 183.88.42.78/183.88.42.78 Port: 445 TCP Blocked
2020-06-06 22:14:20
165.227.135.34 attackspambots
Tried sshing with brute force.
2020-06-06 21:54:56
79.124.62.118 attackspambots
 TCP (SYN) 79.124.62.118:51906 -> port 50000, len 44
2020-06-06 22:28:31
108.190.59.129 attackbots
1591446811 - 06/06/2020 14:33:31 Host: 108.190.59.129/108.190.59.129 Port: 445 TCP Blocked
2020-06-06 21:57:55
51.75.140.153 attackspambots
Jun  6 06:54:35 Tower sshd[41286]: refused connect from 112.64.32.118 (112.64.32.118)
Jun  6 09:52:26 Tower sshd[41286]: Connection from 51.75.140.153 port 51332 on 192.168.10.220 port 22 rdomain ""
Jun  6 09:52:26 Tower sshd[41286]: Failed password for root from 51.75.140.153 port 51332 ssh2
Jun  6 09:52:26 Tower sshd[41286]: Received disconnect from 51.75.140.153 port 51332:11: Bye Bye [preauth]
Jun  6 09:52:26 Tower sshd[41286]: Disconnected from authenticating user root 51.75.140.153 port 51332 [preauth]
2020-06-06 22:14:56
52.42.62.130 attackspambots
Unauthorized connection attempt detected from IP address 52.42.62.130 to port 23
2020-06-06 21:50:49
222.186.180.142 attack
Jun  6 16:03:08 vpn01 sshd[19818]: Failed password for root from 222.186.180.142 port 58809 ssh2
...
2020-06-06 22:03:45
116.110.10.167 attackspam
Lines containing failures of 116.110.10.167
Jun  4 06:10:36 penfold sshd[25284]: Invalid user admin from 116.110.10.167 port 32274
Jun  4 06:10:37 penfold sshd[25284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.110.10.167 
Jun  4 06:10:39 penfold sshd[25290]: Invalid user ubnt from 116.110.10.167 port 25462
Jun  4 06:10:39 penfold sshd[25284]: Failed password for invalid user admin from 116.110.10.167 port 32274 ssh2
Jun  4 06:10:40 penfold sshd[25290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.110.10.167 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=116.110.10.167
2020-06-06 21:53:14
218.92.0.172 attackspambots
" "
2020-06-06 22:30:26
202.163.126.134 attack
Jun  6 09:51:08 NPSTNNYC01T sshd[9718]: Failed password for root from 202.163.126.134 port 57605 ssh2
Jun  6 09:55:21 NPSTNNYC01T sshd[10187]: Failed password for root from 202.163.126.134 port 59309 ssh2
...
2020-06-06 22:15:27
103.83.147.242 attackbotsspam
1591446769 - 06/06/2020 14:32:49 Host: 103.83.147.242/103.83.147.242 Port: 445 TCP Blocked
2020-06-06 22:26:20
70.65.174.69 attackbots
2020-06-06T13:55:51.651636shield sshd\[9665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s010674d02b6537a8.rd.shawcable.net  user=root
2020-06-06T13:55:54.281607shield sshd\[9665\]: Failed password for root from 70.65.174.69 port 57042 ssh2
2020-06-06T13:59:31.374836shield sshd\[10432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s010674d02b6537a8.rd.shawcable.net  user=root
2020-06-06T13:59:33.201762shield sshd\[10432\]: Failed password for root from 70.65.174.69 port 60648 ssh2
2020-06-06T14:03:12.360750shield sshd\[11531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s010674d02b6537a8.rd.shawcable.net  user=root
2020-06-06 22:10:08
34.82.254.168 attack
2020-06-06T15:33:25.922193sd-86998 sshd[19380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.254.82.34.bc.googleusercontent.com  user=root
2020-06-06T15:33:27.762728sd-86998 sshd[19380]: Failed password for root from 34.82.254.168 port 55190 ssh2
2020-06-06T15:36:56.042677sd-86998 sshd[20447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.254.82.34.bc.googleusercontent.com  user=root
2020-06-06T15:36:57.848226sd-86998 sshd[20447]: Failed password for root from 34.82.254.168 port 57634 ssh2
2020-06-06T15:40:15.846189sd-86998 sshd[21724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.254.82.34.bc.googleusercontent.com  user=root
2020-06-06T15:40:17.636855sd-86998 sshd[21724]: Failed password for root from 34.82.254.168 port 60110 ssh2
...
2020-06-06 22:30:07
193.70.12.238 attack
(sshd) Failed SSH login from 193.70.12.238 (FR/France/ns3061480.ip-193-70-12.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun  6 15:27:16 amsweb01 sshd[10051]: User sshd from 193.70.12.238 not allowed because not listed in AllowUsers
Jun  6 15:27:16 amsweb01 sshd[10051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.12.238  user=sshd
Jun  6 15:27:19 amsweb01 sshd[10051]: Failed password for invalid user sshd from 193.70.12.238 port 54664 ssh2
Jun  6 15:27:20 amsweb01 sshd[10051]: Failed password for invalid user sshd from 193.70.12.238 port 54664 ssh2
Jun  6 15:27:23 amsweb01 sshd[10051]: Failed password for invalid user sshd from 193.70.12.238 port 54664 ssh2
2020-06-06 22:21:27

Recently Reported IPs

174.206.144.62 88.221.252.80 160.50.155.88 60.64.109.9
24.180.205.213 43.23.71.122 56.150.217.240 126.132.192.184
229.122.133.106 146.167.17.226 177.195.194.94 14.180.161.40
36.241.178.7 4.151.230.95 41.35.183.77 193.92.204.170
214.150.87.164 72.227.173.86 139.246.209.217 232.195.4.215