Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Richmond

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.136.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28520
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.136.74.			IN	A

;; AUTHORITY SECTION:
.			405	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062601 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 27 08:57:36 CST 2022
;; MSG SIZE  rcvd: 107
Host info
74.136.229.169.in-addr.arpa domain name pointer s2150-d-523.otl.berkeley.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
74.136.229.169.in-addr.arpa	name = s2150-d-523.otl.berkeley.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.145 attackspambots
Apr 30 13:34:34 minden010 sshd[22894]: Failed password for root from 218.92.0.145 port 26186 ssh2
Apr 30 13:34:37 minden010 sshd[22894]: Failed password for root from 218.92.0.145 port 26186 ssh2
Apr 30 13:34:41 minden010 sshd[22894]: Failed password for root from 218.92.0.145 port 26186 ssh2
Apr 30 13:34:44 minden010 sshd[22894]: Failed password for root from 218.92.0.145 port 26186 ssh2
...
2020-04-30 19:43:26
113.230.72.130 attackbotsspam
Brute force blocker - service: proftpd1 - aantal: 88 - Sat Jun  2 08:05:17 2018
2020-04-30 19:28:37
54.68.7.236 attackbots
Apr 28 20:46:17 v26 sshd[16302]: Invalid user hermann from 54.68.7.236 port 56786
Apr 28 20:46:19 v26 sshd[16302]: Failed password for invalid user hermann from 54.68.7.236 port 56786 ssh2
Apr 28 20:46:20 v26 sshd[16302]: Received disconnect from 54.68.7.236 port 56786:11: Bye Bye [preauth]
Apr 28 20:46:20 v26 sshd[16302]: Disconnected from 54.68.7.236 port 56786 [preauth]
Apr 28 20:52:15 v26 sshd[17077]: Invalid user dongmyeong from 54.68.7.236 port 60400
Apr 28 20:52:17 v26 sshd[17077]: Failed password for invalid user dongmyeong from 54.68.7.236 port 60400 ssh2
Apr 28 20:52:17 v26 sshd[17077]: Received disconnect from 54.68.7.236 port 60400:11: Bye Bye [preauth]
Apr 28 20:52:17 v26 sshd[17077]: Disconnected from 54.68.7.236 port 60400 [preauth]
Apr 28 20:54:10 v26 sshd[17362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.68.7.236  user=r.r
Apr 28 20:54:13 v26 sshd[17362]: Failed password for r.r from 54.68.7.236 port 3760........
-------------------------------
2020-04-30 19:21:10
37.59.107.164 attackspambots
Apr 30 12:03:16 sso sshd[15219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.107.164
Apr 30 12:03:18 sso sshd[15219]: Failed password for invalid user git from 37.59.107.164 port 43030 ssh2
...
2020-04-30 19:42:23
125.45.12.133 attackspam
Apr 29 13:25:04 roadrisk sshd[31127]: reveeclipse mapping checking getaddrinfo for hn.kd.ny.adsl [125.45.12.133] failed - POSSIBLE BREAK-IN ATTEMPT!
Apr 29 13:25:06 roadrisk sshd[31127]: Failed password for invalid user ftpuser from 125.45.12.133 port 33242 ssh2
Apr 29 13:25:06 roadrisk sshd[31127]: Received disconnect from 125.45.12.133: 11: Bye Bye [preauth]
Apr 29 13:39:49 roadrisk sshd[31478]: Connection closed by 125.45.12.133 [preauth]
Apr 29 13:43:38 roadrisk sshd[31633]: reveeclipse mapping checking getaddrinfo for hn.kd.ny.adsl [125.45.12.133] failed - POSSIBLE BREAK-IN ATTEMPT!
Apr 29 13:43:39 roadrisk sshd[31633]: Failed password for invalid user milka from 125.45.12.133 port 53490 ssh2
Apr 29 13:43:40 roadrisk sshd[31633]: Received disconnect from 125.45.12.133: 11: Bye Bye [preauth]
Apr 29 13:48:53 roadrisk sshd[31748]: Connection closed by 125.45.12.133 [preauth]
Apr 29 13:53:14 roadrisk sshd[31884]: Connection closed by 125.45.12.133 [preauth]
Apr 29 13:5........
-------------------------------
2020-04-30 19:34:24
35.227.108.34 attack
Fail2Ban Ban Triggered (2)
2020-04-30 19:44:51
157.230.249.62 attack
Apr 30 12:03:42 l03 sshd[2181]: Invalid user student02 from 157.230.249.62 port 64747
...
2020-04-30 19:30:09
190.210.182.93 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-04-30 19:26:52
183.98.215.91 attack
k+ssh-bruteforce
2020-04-30 19:23:15
115.146.126.209 attackspam
2020-04-30T10:07:46.009105shield sshd\[27876\]: Invalid user two from 115.146.126.209 port 44854
2020-04-30T10:07:46.013540shield sshd\[27876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.126.209
2020-04-30T10:07:47.960769shield sshd\[27876\]: Failed password for invalid user two from 115.146.126.209 port 44854 ssh2
2020-04-30T10:12:12.418234shield sshd\[28990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.126.209  user=root
2020-04-30T10:12:14.550945shield sshd\[28990\]: Failed password for root from 115.146.126.209 port 46504 ssh2
2020-04-30 19:19:02
45.119.212.93 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2020-04-30 19:53:28
118.254.134.52 attackspambots
Brute force blocker - service: proftpd1 - aantal: 40 - Fri Jun  1 01:25:17 2018
2020-04-30 19:47:52
46.26.118.12 attack
2020-04-30T10:45:30.600573v220200467592115444 sshd[15845]: Invalid user lester from 46.26.118.12 port 45804
2020-04-30T10:45:30.607112v220200467592115444 sshd[15845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.26.118.12
2020-04-30T10:45:30.600573v220200467592115444 sshd[15845]: Invalid user lester from 46.26.118.12 port 45804
2020-04-30T10:45:32.595142v220200467592115444 sshd[15845]: Failed password for invalid user lester from 46.26.118.12 port 45804 ssh2
2020-04-30T10:59:51.827914v220200467592115444 sshd[16428]: Invalid user webmaster from 46.26.118.12 port 59514
...
2020-04-30 19:37:55
61.94.133.74 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-30 19:51:09
62.234.192.89 attackspam
2020-04-30T06:37:30.901524ionos.janbro.de sshd[93065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.192.89
2020-04-30T06:37:30.823981ionos.janbro.de sshd[93065]: Invalid user sims from 62.234.192.89 port 39094
2020-04-30T06:37:32.892086ionos.janbro.de sshd[93065]: Failed password for invalid user sims from 62.234.192.89 port 39094 ssh2
2020-04-30T06:42:03.305193ionos.janbro.de sshd[93073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.192.89  user=root
2020-04-30T06:42:04.773406ionos.janbro.de sshd[93073]: Failed password for root from 62.234.192.89 port 34996 ssh2
2020-04-30T06:46:31.090226ionos.janbro.de sshd[93080]: Invalid user maxine from 62.234.192.89 port 59126
2020-04-30T06:46:31.109218ionos.janbro.de sshd[93080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.192.89
2020-04-30T06:46:31.090226ionos.janbro.de sshd[93080]: Invalid user
...
2020-04-30 19:31:50

Recently Reported IPs

169.229.136.64 169.229.136.73 169.229.136.76 169.229.87.51
169.229.112.107 169.229.142.0 169.229.143.57 180.76.39.110
180.76.39.217 169.229.224.246 137.226.18.24 49.247.34.184
137.226.62.236 137.226.71.221 137.226.72.95 137.226.198.69
169.229.140.89 169.229.143.9 169.229.145.156 169.229.44.236