Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.13.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59310
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.13.1.			IN	A

;; AUTHORITY SECTION:
.			223	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062202 1800 900 604800 86400

;; Query time: 82 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 23 05:50:35 CST 2022
;; MSG SIZE  rcvd: 105
Host info
1.13.229.169.in-addr.arpa domain name pointer sut-mdc-ar3--et-0-0-0-120.net.berkeley.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.13.229.169.in-addr.arpa	name = sut-mdc-ar3--et-0-0-0-120.net.berkeley.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.87.214.100 attackbots
Jun 20 14:09:38 server sshd[8314]: Failed password for invalid user zzb from 103.87.214.100 port 52586 ssh2
Jun 20 14:13:50 server sshd[11478]: Failed password for invalid user guest from 103.87.214.100 port 50486 ssh2
Jun 20 14:18:01 server sshd[14590]: Failed password for invalid user oscommerce from 103.87.214.100 port 48386 ssh2
2020-06-20 23:01:46
201.219.247.6 attack
ssh intrusion attempt
2020-06-20 22:46:55
107.174.44.184 attackspam
5x Failed Password
2020-06-20 23:05:20
92.118.160.29 attackspambots
 TCP (SYN) 92.118.160.29:51083 -> port 8888, len 44
2020-06-20 23:00:48
5.9.77.102 attackspam
$lgm
2020-06-20 23:09:40
144.34.248.219 attackbotsspam
2020-06-20T08:03:37.040353-07:00 suse-nuc sshd[4231]: Invalid user vnc from 144.34.248.219 port 37972
...
2020-06-20 23:20:43
176.236.37.132 attackspam
++
2020-06-20 23:28:09
97.84.225.94 attack
Jun 20 16:53:31 OPSO sshd\[17613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.84.225.94  user=admin
Jun 20 16:53:34 OPSO sshd\[17613\]: Failed password for admin from 97.84.225.94 port 37738 ssh2
Jun 20 16:54:53 OPSO sshd\[17671\]: Invalid user oracle from 97.84.225.94 port 54522
Jun 20 16:54:53 OPSO sshd\[17671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.84.225.94
Jun 20 16:54:56 OPSO sshd\[17671\]: Failed password for invalid user oracle from 97.84.225.94 port 54522 ssh2
2020-06-20 23:04:07
94.111.151.252 attackbots
94.111.151.252 - - [20/Jun/2020:14:54:00 +0100] "POST /xmlrpc.php HTTP/1.1" 503 18226 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
94.111.151.252 - - [20/Jun/2020:14:54:00 +0100] "POST /wp-login.php HTTP/1.1" 503 18029 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
94.111.151.252 - - [20/Jun/2020:14:58:39 +0100] "POST /xmlrpc.php HTTP/1.1" 503 18029 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-06-20 23:00:15
122.51.83.175 attack
Jun 20 02:14:33 web9 sshd\[5562\]: Invalid user tsbot from 122.51.83.175
Jun 20 02:14:33 web9 sshd\[5562\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.83.175
Jun 20 02:14:34 web9 sshd\[5562\]: Failed password for invalid user tsbot from 122.51.83.175 port 43214 ssh2
Jun 20 02:18:15 web9 sshd\[6000\]: Invalid user repos from 122.51.83.175
Jun 20 02:18:15 web9 sshd\[6000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.83.175
2020-06-20 22:51:43
51.255.109.170 attackbotsspam
Automatic report - Banned IP Access
2020-06-20 23:06:02
218.92.0.173 attackbotsspam
Jun 18 16:05:33 mail sshd[22688]: Failed password for root from 218.92.0.173 port 19009 ssh2
Jun 18 16:05:37 mail sshd[22688]: Failed password for root from 218.92.0.173 port 19009 ssh2
...
2020-06-20 23:26:20
74.82.47.42 attackbots
 UDP 74.82.47.42:63976 -> port 19, len 29
2020-06-20 23:16:10
153.3.219.11 attackspambots
Jun 20 12:10:28 vlre-nyc-1 sshd\[13116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.3.219.11  user=root
Jun 20 12:10:31 vlre-nyc-1 sshd\[13116\]: Failed password for root from 153.3.219.11 port 52464 ssh2
Jun 20 12:18:02 vlre-nyc-1 sshd\[13313\]: Invalid user report from 153.3.219.11
Jun 20 12:18:02 vlre-nyc-1 sshd\[13313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.3.219.11
Jun 20 12:18:04 vlre-nyc-1 sshd\[13313\]: Failed password for invalid user report from 153.3.219.11 port 31128 ssh2
...
2020-06-20 22:58:05
101.32.1.249 attackbots
Jun 19 06:22:57 mail sshd[10271]: Failed password for root from 101.32.1.249 port 36620 ssh2
...
2020-06-20 23:18:25

Recently Reported IPs

169.229.17.30 169.229.24.144 137.226.46.48 137.226.40.98
169.229.23.140 180.76.82.165 169.229.35.122 180.76.119.201
180.76.229.196 169.229.16.8 169.229.13.128 169.229.19.219
169.229.15.231 169.229.24.244 169.229.15.83 169.229.13.87
169.229.20.40 169.229.16.191 180.76.40.9 169.229.12.121