Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.139.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35380
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.139.244.		IN	A

;; AUTHORITY SECTION:
.			429	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062501 1800 900 604800 86400

;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 26 06:49:01 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 244.139.229.169.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.139.229.169.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
209.146.23.182 attack
email spam
2019-11-08 22:12:23
216.218.206.72 attack
3389BruteforceFW21
2019-11-08 22:50:19
172.93.205.52 attackbots
email spam
2019-11-08 22:18:56
168.181.196.25 attack
email spam
2019-11-08 22:19:31
170.79.122.172 attackspambots
postfix (unknown user, SPF fail or relay access denied)
2019-11-08 22:19:19
103.76.137.2 attack
email spam
2019-11-08 22:26:18
58.48.168.166 attack
email spam
2019-11-08 22:31:15
130.207.54.144 attackspambots
Port scan on 1 port(s): 53
2019-11-08 22:46:06
41.164.169.106 attackbots
Absender hat Spam-Falle ausgel?st
2019-11-08 22:07:33
178.168.19.139 attack
email spam
2019-11-08 22:17:56
78.83.242.229 attackspambots
email spam
2019-11-08 22:30:39
177.36.6.252 attackbotsspam
Brute force attempt
2019-11-08 22:18:18
187.92.175.52 attackbots
proto=tcp  .  spt=43431  .  dpt=25  .     (Listed on    truncate-gbudb also unsubscore and rbldns-ru)     (380)
2019-11-08 22:15:35
37.57.103.177 attack
2019-11-08T09:41:35.798282hub.schaetter.us sshd\[31804\]: Invalid user uploader from 37.57.103.177 port 34642
2019-11-08T09:41:35.811911hub.schaetter.us sshd\[31804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.57.103.177
2019-11-08T09:41:37.644990hub.schaetter.us sshd\[31804\]: Failed password for invalid user uploader from 37.57.103.177 port 34642 ssh2
2019-11-08T09:45:46.556890hub.schaetter.us sshd\[31839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.57.103.177  user=root
2019-11-08T09:45:49.182558hub.schaetter.us sshd\[31839\]: Failed password for root from 37.57.103.177 port 44000 ssh2
...
2019-11-08 22:32:58
103.76.203.35 attack
email spam
2019-11-08 22:25:56

Recently Reported IPs

223.76.192.60 181.129.184.162 181.121.32.58 179.231.163.104
169.229.219.70 169.229.177.128 169.229.220.20 137.226.251.20
52.200.191.158 169.229.153.166 169.229.154.188 169.229.178.133
169.229.207.67 169.229.207.207 169.229.182.75 169.229.182.70
169.229.210.62 169.229.210.33 169.229.205.67 169.229.187.230