Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.109.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33589
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.109.99.			IN	A

;; AUTHORITY SECTION:
.			228	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061302 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 14 04:57:10 CST 2022
;; MSG SIZE  rcvd: 107
Host info
99.109.229.169.in-addr.arpa domain name pointer ckc-109-99.reshall.berkeley.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.109.229.169.in-addr.arpa	name = ckc-109-99.reshall.berkeley.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.70.40.131 attackbots
52869/tcp 52869/tcp
[2020-10-04]2pkt
2020-10-06 06:42:59
217.153.157.227 attackspambots
8728/tcp
[2020-10-04]1pkt
2020-10-06 06:26:09
217.182.37.191 attackbotsspam
SSH login attempts.
2020-10-06 06:25:57
41.65.186.232 attackbots
445/tcp 445/tcp
[2020-10-04]2pkt
2020-10-06 06:46:34
187.106.81.102 attackspambots
bruteforce detected
2020-10-06 06:14:18
94.232.43.78 attackbotsspam
RDPBruteGSL24
2020-10-06 06:40:52
222.186.42.7 attackspambots
Oct  6 00:41:23 piServer sshd[28856]: Failed password for root from 222.186.42.7 port 45222 ssh2
Oct  6 00:41:26 piServer sshd[28856]: Failed password for root from 222.186.42.7 port 45222 ssh2
Oct  6 00:41:29 piServer sshd[28856]: Failed password for root from 222.186.42.7 port 45222 ssh2
...
2020-10-06 06:43:23
112.35.149.86 attack
$f2bV_matches
2020-10-06 06:34:46
163.19.200.153 attack
2020-10-05 13:38:42.560833-0500  localhost screensharingd[20506]: Authentication: FAILED :: User Name: N/A :: Viewer Address: 163.19.200.153 :: Type: VNC DES
2020-10-06 06:10:21
163.27.176.178 attackspambots
2020-10-05 13:23:37.080230-0500  localhost screensharingd[19470]: Authentication: FAILED :: User Name: N/A :: Viewer Address: 163.27.176.178 :: Type: VNC DES
2020-10-06 06:09:56
115.58.17.164 attackbotsspam
23/tcp
[2020-10-04]1pkt
2020-10-06 06:20:38
201.159.114.203 attackspam
Icarus honeypot on github
2020-10-06 06:30:10
80.254.48.254 attackbots
leo_www
2020-10-06 06:41:44
27.202.4.216 attackspam
2323/tcp
[2020-10-04]1pkt
2020-10-06 06:28:39
139.59.40.240 attackbotsspam
Oct  6 00:07:06 rancher-0 sshd[488183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.40.240  user=root
Oct  6 00:07:08 rancher-0 sshd[488183]: Failed password for root from 139.59.40.240 port 56898 ssh2
...
2020-10-06 06:15:31

Recently Reported IPs

169.229.107.48 169.229.101.57 169.229.144.210 169.229.145.232
169.229.244.91 169.229.244.73 137.226.15.7 169.229.42.162
169.229.42.212 169.229.42.82 169.229.43.77 169.229.44.45
169.229.42.150 169.229.32.81 169.229.33.87 169.229.28.87
169.229.36.87 137.226.130.12 169.229.35.239 169.229.38.24