Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Berkeley

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.11.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60559
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.11.16.			IN	A

;; AUTHORITY SECTION:
.			546	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062200 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 23 00:55:27 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 16.11.229.169.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 16.11.229.169.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
201.149.15.230 attackbots
Unauthorized connection attempt detected from IP address 201.149.15.230 to port 10443 [T]
2020-08-14 01:33:34
52.141.56.25 attackbotsspam
Icarus honeypot on github
2020-08-14 02:09:43
113.173.85.110 attackbots
Unauthorized connection attempt detected from IP address 113.173.85.110 to port 445 [T]
2020-08-14 02:04:12
41.223.245.132 attackspambots
Unauthorized connection attempt detected from IP address 41.223.245.132 to port 445 [T]
2020-08-14 01:51:43
213.55.95.185 attack
Unauthorized connection attempt detected from IP address 213.55.95.185 to port 445 [T]
2020-08-14 01:54:51
192.118.32.250 attackspam
Unauthorized connection attempt detected from IP address 192.118.32.250 to port 445 [T]
2020-08-14 01:57:06
201.151.237.130 attackbotsspam
Unauthorized connection attempt detected from IP address 201.151.237.130 to port 445 [T]
2020-08-14 01:33:01
80.82.77.227 attack
 TCP (SYN) 80.82.77.227:52456 -> port 1024, len 44
2020-08-14 02:09:13
185.100.87.250 attackspam
2020-08-13T09:24:51.333921morrigan.ad5gb.com dovecot[1314]: imap-login: Disconnected (no auth attempts in 0 secs): user=<>, rip=185.100.87.250, lip=51.81.135.66, session=<0oc8EcOs1L65ZFf6>
2020-08-13T09:25:08.634743morrigan.ad5gb.com dovecot[1314]: imap-login: Disconnected (no auth attempts in 1 secs): user=<>, rip=185.100.87.250, lip=51.81.135.66, session=
2020-08-14 01:36:07
83.142.167.207 attack
Unauthorized connection attempt detected from IP address 83.142.167.207 to port 23 [T]
2020-08-14 02:08:26
60.217.72.12 attack
Unauthorized connection attempt detected from IP address 60.217.72.12 to port 80 [T]
2020-08-14 01:47:16
185.213.138.2 attackbotsspam
Unauthorized connection attempt detected from IP address 185.213.138.2 to port 445 [T]
2020-08-14 01:35:35
213.85.24.130 attackspambots
Unauthorized connection attempt detected from IP address 213.85.24.130 to port 23 [T]
2020-08-14 01:54:33
216.218.168.121 attackbotsspam
Unauthorized connection attempt detected from IP address 216.218.168.121 to port 5443 [T]
2020-08-14 01:32:37
125.59.107.205 attack
Unauthorized connection attempt detected from IP address 125.59.107.205 to port 5555 [T]
2020-08-14 01:39:59

Recently Reported IPs

169.229.11.139 169.229.11.130 180.76.38.250 169.229.11.31
169.229.11.87 169.229.174.141 169.229.11.105 137.226.29.86
137.226.18.208 114.5.209.45 137.226.163.127 137.226.36.155
137.226.36.146 218.30.103.113 103.132.55.174 137.226.35.180
137.226.36.222 137.226.165.254 93.107.222.164 169.229.79.192