Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Berkeley

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.0.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56239
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.0.53.			IN	A

;; AUTHORITY SECTION:
.			251	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062601 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 27 08:14:15 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 53.0.229.169.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.0.229.169.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
124.154.25.100 attackbots
ssh failed login
2019-07-09 18:49:59
202.75.62.198 attackbotsspam
Unauthorised access (Jul  9) SRC=202.75.62.198 LEN=40 TTL=245 ID=38792 TCP DPT=445 WINDOW=1024 SYN
2019-07-09 18:25:14
200.33.89.229 attackspambots
Jul  8 23:18:58 web1 postfix/smtpd[4924]: warning: unknown[200.33.89.229]: SASL PLAIN authentication failed: authentication failure
...
2019-07-09 18:23:03
115.209.239.76 attack
firewall-block, port(s): 23/tcp
2019-07-09 18:09:15
37.120.135.221 attackbotsspam
\[2019-07-09 06:07:36\] NOTICE\[13443\] chan_sip.c: Registration from '\' failed for '37.120.135.221:1205' - Wrong password
\[2019-07-09 06:07:36\] SECURITY\[13451\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-09T06:07:36.855-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="13769",SessionID="0x7f02f876b078",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.120.135.221/58441",Challenge="1050b7a0",ReceivedChallenge="1050b7a0",ReceivedHash="974dee17900828eb23ad97f2ef6000d0"
\[2019-07-09 06:08:36\] NOTICE\[13443\] chan_sip.c: Registration from '\' failed for '37.120.135.221:1209' - Wrong password
\[2019-07-09 06:08:36\] SECURITY\[13451\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-09T06:08:36.116-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="9116",SessionID="0x7f02f85a4d78",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37
2019-07-09 18:08:42
206.189.136.160 attack
2019-07-09T12:49:15.751150centos sshd\[2318\]: Invalid user willy from 206.189.136.160 port 53872
2019-07-09T12:49:15.755307centos sshd\[2318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.136.160
2019-07-09T12:49:17.699697centos sshd\[2318\]: Failed password for invalid user willy from 206.189.136.160 port 53872 ssh2
2019-07-09 18:54:21
41.205.8.168 attackbots
2019-07-09T05:19:34.496967 X postfix/smtpd[58997]: NOQUEUE: reject: RCPT from unknown[41.205.8.168]: 554 5.7.1 Service unavailable; Client host [41.205.8.168] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/41.205.8.168; from= to= proto=ESMTP helo=
2019-07-09 18:14:52
106.12.91.102 attackbotsspam
Jul  9 11:27:04 server01 sshd\[16197\]: Invalid user image from 106.12.91.102
Jul  9 11:27:04 server01 sshd\[16197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.91.102
Jul  9 11:27:06 server01 sshd\[16197\]: Failed password for invalid user image from 106.12.91.102 port 57462 ssh2
...
2019-07-09 18:04:52
51.158.106.49 attackbots
LGS,WP GET /wordpress8/wp-login.php
2019-07-09 18:46:33
165.22.78.120 attackbotsspam
SSH bruteforce
2019-07-09 18:38:13
117.78.38.63 attackspam
ThinkPHP Remote Code Execution Vulnerability, PTR: ecs-117-78-38-63.compute.hwclouds-dns.com.
2019-07-09 18:26:15
85.237.63.124 attack
email spam
2019-07-09 18:02:51
206.189.23.43 attackspambots
2019-07-09T08:05:25.812622abusebot-4.cloudsearch.cf sshd\[24721\]: Invalid user tomcat from 206.189.23.43 port 54722
2019-07-09 18:49:31
79.137.79.167 attackbots
Jul  8 23:19:48 vps200512 sshd\[7382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.79.167  user=root
Jul  8 23:19:50 vps200512 sshd\[7382\]: Failed password for root from 79.137.79.167 port 58445 ssh2
Jul  8 23:19:51 vps200512 sshd\[7384\]: Invalid user 666666 from 79.137.79.167
Jul  8 23:19:51 vps200512 sshd\[7384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.79.167
Jul  8 23:19:53 vps200512 sshd\[7384\]: Failed password for invalid user 666666 from 79.137.79.167 port 53576 ssh2
2019-07-09 18:11:34
36.152.65.193 attackspam
Caught in portsentry honeypot
2019-07-09 18:22:06

Recently Reported IPs

220.117.153.52 169.229.0.41 137.226.174.180 169.229.87.218
169.229.137.208 169.229.137.233 169.229.136.71 137.226.180.217
169.229.93.248 169.229.136.241 137.226.175.12 137.226.173.112
137.226.118.81 169.229.136.34 67.52.230.46 180.76.117.158
137.226.15.147 43.154.15.98 74.101.39.80 37.103.176.202