Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Richmond

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.140.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9074
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.140.140.		IN	A

;; AUTHORITY SECTION:
.			528	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062801 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 29 08:35:01 CST 2022
;; MSG SIZE  rcvd: 108
Host info
140.140.229.169.in-addr.arpa domain name pointer cads3.urel.berkeley.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.140.229.169.in-addr.arpa	name = cads3.urel.berkeley.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
83.151.234.74 attackbots
Caught in portsentry honeypot
2019-12-26 23:31:41
218.92.0.164 attack
Dec 26 16:26:30 vps647732 sshd[5570]: Failed password for root from 218.92.0.164 port 23343 ssh2
Dec 26 16:26:40 vps647732 sshd[5570]: Failed password for root from 218.92.0.164 port 23343 ssh2
...
2019-12-26 23:33:08
45.55.173.232 attackspam
GET /news/wp-login.php
2019-12-27 00:03:56
205.185.117.232 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-26 23:30:53
67.205.153.74 attack
GET /wp-login.php
2019-12-26 23:58:50
51.83.234.53 attackspambots
$f2bV_matches
2019-12-26 23:27:31
195.222.48.151 attackspambots
GET /website/wp-login.php
2019-12-26 23:48:30
46.246.35.227 attackbots
$f2bV_matches
2019-12-26 23:44:31
188.163.60.55 attackspam
Unauthorized connection attempt detected from IP address 188.163.60.55 to port 445
2019-12-26 23:39:42
45.40.165.142 attack
POST /xmlrpc.php.  Part of botnet attack -- 34 POST requests from 19 different IP addresses.
2019-12-27 00:04:42
97.74.24.113 attackspam
POST /xmlrpc.php.  Part of botnet attack -- 34 POST requests from 19 different IP addresses.
2019-12-26 23:53:47
89.35.39.60 attackbotsspam
Automatic report - XMLRPC Attack
2019-12-26 23:56:23
91.221.70.80 attackspam
POST /login/?login_only=1  Attempting to login via port 2083.  No user agent.
2019-12-26 23:55:06
198.27.80.123 attackspam
//admin/images/cal_date_over.gif
/wp-login.php
//templates/system/css/system.css
2019-12-26 23:47:47
46.246.45.105 attack
$f2bV_matches
2019-12-26 23:42:59

Recently Reported IPs

169.229.140.151 169.229.140.180 169.229.140.158 169.229.140.156
137.226.144.122 137.226.203.59 137.226.170.237 141.212.122.210
170.83.78.1 137.226.141.189 141.212.122.28 137.226.45.3
169.229.114.173 169.229.140.243 143.215.130.213 169.229.65.172
169.229.117.173 169.229.144.11 169.229.28.214 169.229.135.231