Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.111.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30640
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.111.114.		IN	A

;; AUTHORITY SECTION:
.			221	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062601 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 27 07:30:39 CST 2022
;; MSG SIZE  rcvd: 108
Host info
114.111.229.169.in-addr.arpa domain name pointer ckc-111-114.reshall.berkeley.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
114.111.229.169.in-addr.arpa	name = ckc-111-114.reshall.berkeley.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
157.230.27.30 attackspam
157.230.27.30 - - [10/Oct/2020:03:51:44 +0100] "POST /wp-login.php HTTP/1.1" 200 2227 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.230.27.30 - - [10/Oct/2020:03:51:46 +0100] "POST /wp-login.php HTTP/1.1" 200 2195 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.230.27.30 - - [10/Oct/2020:03:51:49 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-10 14:06:48
193.112.11.212 attack
193.112.11.212 (CN/China/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct  9 11:12:41 server2 sshd[3038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.11.212  user=root
Oct  9 11:12:43 server2 sshd[3038]: Failed password for root from 193.112.11.212 port 58510 ssh2
Oct  9 11:14:43 server2 sshd[4080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.73.109  user=root
Oct  9 11:14:45 server2 sshd[4080]: Failed password for root from 43.226.73.109 port 45568 ssh2
Oct  9 11:19:24 server2 sshd[6604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.68.11.207  user=root
Oct  9 11:17:34 server2 sshd[5608]: Failed password for root from 176.31.182.79 port 58826 ssh2

IP Addresses Blocked:
2020-10-10 07:47:19
41.188.44.38 attackbots
WordPress brute force
2020-10-10 07:49:28
139.255.4.205 attackspam
Ssh brute force
2020-10-10 08:01:42
221.202.197.114 attackbots
Port probing on unauthorized port 23
2020-10-10 14:10:07
106.0.58.136 attackspambots
Web scan/attack: detected 1 distinct attempts within a 12-hour window (GPON (CVE-2018-10561))
2020-10-10 07:56:52
94.102.54.252 attack
Sep 21 00:19:27 *hidden* postfix/postscreen[26999]: DNSBL rank 3 for [94.102.54.252]:57832
2020-10-10 14:13:07
124.126.18.130 attackbotsspam
Oct  7 01:35:48 v26 sshd[14679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.126.18.130  user=r.r
Oct  7 01:35:51 v26 sshd[14679]: Failed password for r.r from 124.126.18.130 port 26187 ssh2
Oct  7 01:35:51 v26 sshd[14679]: Received disconnect from 124.126.18.130 port 26187:11: Bye Bye [preauth]
Oct  7 01:35:51 v26 sshd[14679]: Disconnected from 124.126.18.130 port 26187 [preauth]
Oct  7 01:50:12 v26 sshd[3909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.126.18.130  user=r.r
Oct  7 01:50:15 v26 sshd[3909]: Failed password for r.r from 124.126.18.130 port 40572 ssh2
Oct  7 01:50:15 v26 sshd[3909]: Received disconnect from 124.126.18.130 port 40572:11: Bye Bye [preauth]
Oct  7 01:50:15 v26 sshd[3909]: Disconnected from 124.126.18.130 port 40572 [preauth]
Oct  7 01:54:37 v26 sshd[4663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.........
-------------------------------
2020-10-10 14:05:18
113.113.81.174 attackspambots
IP blocked
2020-10-10 07:45:00
186.90.97.124 attackbots
Unauthorized connection attempt from IP address 186.90.97.124 on Port 445(SMB)
2020-10-10 07:54:51
61.177.172.89 attackspam
"fail2ban match"
2020-10-10 07:55:12
201.91.24.58 attackspambots
Unauthorised access (Oct  9) SRC=201.91.24.58 LEN=52 TOS=0x10 PREC=0x40 TTL=115 ID=19509 DF TCP DPT=445 WINDOW=8192 SYN
2020-10-10 08:05:43
201.193.198.70 attackspambots
1602276541 - 10/09/2020 22:49:01 Host: 201.193.198.70/201.193.198.70 Port: 445 TCP Blocked
...
2020-10-10 14:07:30
212.70.149.52 attack
Oct 10 07:41:39 mail postfix/smtpd\[21467\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 10 08:11:53 mail postfix/smtpd\[22564\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 10 08:12:19 mail postfix/smtpd\[22440\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 10 08:12:44 mail postfix/smtpd\[22566\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-10-10 14:11:37
121.46.84.150 attackspam
Lines containing failures of 121.46.84.150
Oct  7 06:15:08 shared06 sshd[27291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.84.150  user=r.r
Oct  7 06:15:10 shared06 sshd[27291]: Failed password for r.r from 121.46.84.150 port 17742 ssh2
Oct  7 06:15:10 shared06 sshd[27291]: Received disconnect from 121.46.84.150 port 17742:11: Bye Bye [preauth]
Oct  7 06:15:10 shared06 sshd[27291]: Disconnected from authenticating user r.r 121.46.84.150 port 17742 [preauth]
Oct  7 06:24:20 shared06 sshd[30535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.84.150  user=r.r
Oct  7 06:24:22 shared06 sshd[30535]: Failed password for r.r from 121.46.84.150 port 64708 ssh2
Oct  7 06:24:22 shared06 sshd[30535]: Received disconnect from 121.46.84.150 port 64708:11: Bye Bye [preauth]
Oct  7 06:24:22 shared06 sshd[30535]: Disconnected from authenticating user r.r 121.46.84.150 port 64708 [preauth........
------------------------------
2020-10-10 07:44:40

Recently Reported IPs

169.229.85.110 169.229.135.25 169.229.138.72 169.229.141.47
137.226.173.215 137.226.182.2 169.229.133.236 169.229.133.237
169.229.133.238 169.229.134.22 137.226.114.135 79.124.62.56
137.226.181.73 137.226.182.52 192.251.226.83 137.226.115.84
137.226.169.213 137.226.173.50 137.226.174.41 137.226.174.64