Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Richmond

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.136.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12479
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.136.42.			IN	A

;; AUTHORITY SECTION:
.			209	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062601 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 27 08:57:08 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 42.136.229.169.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.136.229.169.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.236.2.45 attackspam
SSH Brute Force
2019-11-01 12:05:48
167.71.55.1 attackspambots
Invalid user spanish from 167.71.55.1 port 35874
2019-11-01 08:22:41
104.248.181.156 attackspam
SSH Brute Force
2019-11-01 12:01:01
104.248.186.19 attack
SSH Brute Force
2019-11-01 12:00:34
185.156.73.17 attackbotsspam
ET DROP Dshield Block Listed Source group 1 - port: 51534 proto: TCP cat: Misc Attack
2019-11-01 12:18:40
157.245.81.162 attack
" "
2019-11-01 12:09:46
119.29.10.25 attackspam
Invalid user gnats from 119.29.10.25 port 58647
2019-11-01 08:27:02
39.118.39.170 attack
2019-11-01T00:50:43.731150stark.klein-stark.info sshd\[17850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.118.39.170  user=root
2019-11-01T00:50:45.446165stark.klein-stark.info sshd\[17850\]: Failed password for root from 39.118.39.170 port 60778 ssh2
2019-11-01T01:08:08.137620stark.klein-stark.info sshd\[18954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.118.39.170  user=root
...
2019-11-01 08:14:22
14.225.17.9 attackbotsspam
2019-11-01T03:57:13.254685shield sshd\[5835\]: Invalid user wayne from 14.225.17.9 port 60740
2019-11-01T03:57:13.260042shield sshd\[5835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.225.17.9
2019-11-01T03:57:16.052814shield sshd\[5835\]: Failed password for invalid user wayne from 14.225.17.9 port 60740 ssh2
2019-11-01T04:01:29.923156shield sshd\[5935\]: Invalid user operador from 14.225.17.9 port 43076
2019-11-01T04:01:29.928900shield sshd\[5935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.225.17.9
2019-11-01 12:18:19
144.217.85.183 attack
Invalid user hu from 144.217.85.183 port 35044
2019-11-01 08:24:47
104.45.11.126 attackspambots
SSH Brute Force
2019-11-01 12:00:03
42.159.121.111 attackbots
Invalid user psimiyu from 42.159.121.111 port 3466
2019-11-01 08:13:55
61.93.201.198 attackbots
Invalid user aldeissys from 61.93.201.198 port 40597
2019-11-01 08:11:33
103.87.25.201 attackspambots
SSH Brute Force
2019-11-01 12:07:31
81.30.182.215 attack
postfix (unknown user, SPF fail or relay access denied)
2019-11-01 12:04:06

Recently Reported IPs

169.229.136.46 169.229.136.49 169.229.136.50 169.229.136.54
169.229.136.60 169.229.136.61 169.229.136.64 169.229.136.74
169.229.136.73 169.229.136.76 169.229.87.51 169.229.112.107
169.229.142.0 169.229.143.57 180.76.39.110 180.76.39.217
169.229.224.246 137.226.18.24 49.247.34.184 137.226.62.236