Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Juba

Region: Central Equatoria

Country: South Sudan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       129.222.0.0 - 129.222.255.255
CIDR:           129.222.0.0/16
NetName:        SPACEX-STARLINK-IPV4
NetHandle:      NET-129-222-0-0-1
Parent:         NET129 (NET-129-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   SpaceX Services, Inc. (SS-2296)
RegDate:        2021-12-06
Updated:        2021-12-07
Ref:            https://rdap.arin.net/registry/ip/129.222.0.0



OrgName:        SpaceX Services, Inc.
OrgId:          SS-2296
Address:        1 Rocket Rd
City:           Hawthorne
StateProv:      CA
PostalCode:     90250
Country:        US
RegDate:        2019-06-24
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/SS-2296


OrgRoutingHandle: STARL42-ARIN
OrgRoutingName:   Starlink NOC
OrgRoutingPhone:  +1-310-363-6000 
OrgRoutingEmail:  starlink-noc@spacex.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/STARL42-ARIN

OrgDNSHandle: STARL42-ARIN
OrgDNSName:   Starlink NOC
OrgDNSPhone:  +1-310-363-6000 
OrgDNSEmail:  starlink-noc@spacex.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/STARL42-ARIN

OrgAbuseHandle: STARL38-ARIN
OrgAbuseName:   Starlink Abuse
OrgAbusePhone:  +1-310-363-6000 
OrgAbuseEmail:  starlink-abuse@spacex.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/STARL38-ARIN

OrgNOCHandle: STARL42-ARIN
OrgNOCName:   Starlink NOC
OrgNOCPhone:  +1-310-363-6000 
OrgNOCEmail:  starlink-noc@spacex.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/STARL42-ARIN

OrgTechHandle: STARL42-ARIN
OrgTechName:   Starlink NOC
OrgTechPhone:  +1-310-363-6000 
OrgTechEmail:  starlink-noc@spacex.com
OrgTechRef:    https://rdap.arin.net/registry/entity/STARL42-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.222.116.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39640
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.222.116.169.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110500 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 05 15:19:24 CST 2025
;; MSG SIZE  rcvd: 108
Host info
169.116.222.129.in-addr.arpa domain name pointer customer.nrbiken1.pop.starlinkisp.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
169.116.222.129.in-addr.arpa	name = customer.nrbiken1.pop.starlinkisp.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.99.84.85 attackbots
$f2bV_matches
2020-03-13 12:07:55
106.13.202.238 attackspam
Mar 12 22:56:40 dallas01 sshd[7409]: Failed password for root from 106.13.202.238 port 40106 ssh2
Mar 12 22:58:03 dallas01 sshd[7742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.202.238
Mar 12 22:58:06 dallas01 sshd[7742]: Failed password for invalid user hasmtpuser from 106.13.202.238 port 54918 ssh2
2020-03-13 12:14:35
198.211.110.133 attack
2020-03-13T03:51:15.206342abusebot-7.cloudsearch.cf sshd[8924]: Invalid user wwwadmin from 198.211.110.133 port 50568
2020-03-13T03:51:15.211174abusebot-7.cloudsearch.cf sshd[8924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.110.133
2020-03-13T03:51:15.206342abusebot-7.cloudsearch.cf sshd[8924]: Invalid user wwwadmin from 198.211.110.133 port 50568
2020-03-13T03:51:17.142836abusebot-7.cloudsearch.cf sshd[8924]: Failed password for invalid user wwwadmin from 198.211.110.133 port 50568 ssh2
2020-03-13T03:54:56.677655abusebot-7.cloudsearch.cf sshd[9163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.110.133  user=root
2020-03-13T03:54:58.618871abusebot-7.cloudsearch.cf sshd[9163]: Failed password for root from 198.211.110.133 port 39676 ssh2
2020-03-13T03:58:36.470397abusebot-7.cloudsearch.cf sshd[9389]: Invalid user tmpu from 198.211.110.133 port 57686
...
2020-03-13 12:04:26
121.180.248.58 attack
scan z
2020-03-13 12:23:58
181.129.161.28 attack
SSH bruteforce (Triggered fail2ban)
2020-03-13 12:15:54
189.254.33.157 attack
2020-03-13T05:14:12.637559scmdmz1 sshd[23914]: Invalid user dmsplus.scmgroup from 189.254.33.157 port 60080
2020-03-13T05:14:13.944731scmdmz1 sshd[23914]: Failed password for invalid user dmsplus.scmgroup from 189.254.33.157 port 60080 ssh2
2020-03-13T05:18:00.713770scmdmz1 sshd[24353]: Invalid user dmsplus from 189.254.33.157 port 44949
...
2020-03-13 12:25:27
115.239.200.18 attackbotsspam
20/3/12@23:58:08: FAIL: Alarm-Network address from=115.239.200.18
20/3/12@23:58:08: FAIL: Alarm-Network address from=115.239.200.18
...
2020-03-13 12:23:01
82.223.33.63 attackspam
$f2bV_matches
2020-03-13 12:23:31
196.52.43.56 attackspam
Unauthorized connection attempt detected from IP address 196.52.43.56 to port 5916
2020-03-13 12:26:21
206.189.128.215 attackspam
Mar 13 05:19:45 sd-53420 sshd\[11681\]: User root from 206.189.128.215 not allowed because none of user's groups are listed in AllowGroups
Mar 13 05:19:45 sd-53420 sshd\[11681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.128.215  user=root
Mar 13 05:19:47 sd-53420 sshd\[11681\]: Failed password for invalid user root from 206.189.128.215 port 40558 ssh2
Mar 13 05:21:16 sd-53420 sshd\[11860\]: User root from 206.189.128.215 not allowed because none of user's groups are listed in AllowGroups
Mar 13 05:21:16 sd-53420 sshd\[11860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.128.215  user=root
...
2020-03-13 12:32:45
195.154.232.135 attackproxy
SIPVicious Scanner Detection
2020-03-13 09:31:18
222.186.180.130 attackspambots
Unauthorized connection attempt detected from IP address 222.186.180.130 to port 22 [T]
2020-03-13 12:32:18
49.234.83.78 attackspam
Mar 13 04:51:16 h2779839 sshd[15898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.83.78  user=root
Mar 13 04:51:19 h2779839 sshd[15898]: Failed password for root from 49.234.83.78 port 57748 ssh2
Mar 13 04:53:36 h2779839 sshd[15957]: Invalid user lisha from 49.234.83.78 port 57556
Mar 13 04:53:36 h2779839 sshd[15957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.83.78
Mar 13 04:53:36 h2779839 sshd[15957]: Invalid user lisha from 49.234.83.78 port 57556
Mar 13 04:53:38 h2779839 sshd[15957]: Failed password for invalid user lisha from 49.234.83.78 port 57556 ssh2
Mar 13 04:55:57 h2779839 sshd[16229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.83.78  user=root
Mar 13 04:55:59 h2779839 sshd[16229]: Failed password for root from 49.234.83.78 port 57364 ssh2
Mar 13 04:58:23 h2779839 sshd[16389]: pam_unix(sshd:auth): authentication failure; l
...
2020-03-13 12:13:06
45.143.220.171 spamattackproxy
SIPVicious Scanner Detection
2020-03-13 09:29:36
101.91.160.243 attackspambots
Mar 13 04:58:38 ns381471 sshd[4045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.91.160.243
Mar 13 04:58:40 ns381471 sshd[4045]: Failed password for invalid user Michelle from 101.91.160.243 port 51866 ssh2
2020-03-13 12:01:33

Recently Reported IPs

115.192.61.8 47.120.31.77 109.105.210.92 140.249.219.201
110.7.106.170 110.7.106.209 54.189.221.247 34.38.38.180
194.92.43.186 194.187.179.160 14.212.92.198 14.220.183.124
159.203.90.251 27.46.75.9 122.53.218.236 23.39.210.15
119.147.19.76 48.210.57.181 175.178.155.20 123.131.203.121