Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.142.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60040
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.142.12.			IN	A

;; AUTHORITY SECTION:
.			156	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061302 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 14 05:43:18 CST 2022
;; MSG SIZE  rcvd: 107
Host info
12.142.229.169.in-addr.arpa domain name pointer hmf24.ehs.berkeley.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.142.229.169.in-addr.arpa	name = hmf24.ehs.berkeley.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
5.105.92.13 attackspam
Icarus honeypot on github
2020-10-01 19:07:04
121.32.48.30 attackbotsspam
Brute forcing email accounts
2020-10-01 18:36:03
68.183.186.65 attack
Sep 30 20:34:58 IngegnereFirenze sshd[8255]: Did not receive identification string from 68.183.186.65 port 60686
...
2020-10-01 18:34:59
188.131.140.160 attack
Oct  1 11:47:45 vps8769 sshd[8594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.140.160
Oct  1 11:47:46 vps8769 sshd[8594]: Failed password for invalid user ann from 188.131.140.160 port 38672 ssh2
...
2020-10-01 18:31:50
87.251.80.10 attackspam
Found on   Dark List de    / proto=6  .  srcport=48937  .  dstport=2202  .     (1155)
2020-10-01 19:03:45
123.252.218.62 attack
Invalid user git from 123.252.218.62 port 42310
2020-10-01 18:43:48
115.42.127.133 attackbotsspam
Found on   Github Combined on 4 lists    / proto=6  .  srcport=42461  .  dstport=13382  .     (1059)
2020-10-01 19:02:52
129.226.179.238 attackspam
SSH login attempts.
2020-10-01 19:09:07
139.219.11.254 attackspam
$f2bV_matches
2020-10-01 19:04:50
91.231.121.54 attack
Automatic report - Banned IP Access
2020-10-01 18:44:07
103.45.183.136 attackspambots
(sshd) Failed SSH login from 103.45.183.136 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  1 09:13:38 server2 sshd[4248]: Invalid user debian from 103.45.183.136 port 52388
Oct  1 09:13:40 server2 sshd[4248]: Failed password for invalid user debian from 103.45.183.136 port 52388 ssh2
Oct  1 09:32:29 server2 sshd[7236]: Invalid user postgres from 103.45.183.136 port 60694
Oct  1 09:32:31 server2 sshd[7236]: Failed password for invalid user postgres from 103.45.183.136 port 60694 ssh2
Oct  1 09:38:54 server2 sshd[8216]: Invalid user server from 103.45.183.136 port 58276
2020-10-01 18:51:47
140.143.30.191 attack
Oct  1 09:48:45 vps647732 sshd[6921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.30.191
Oct  1 09:48:47 vps647732 sshd[6921]: Failed password for invalid user hms from 140.143.30.191 port 45620 ssh2
...
2020-10-01 19:08:27
178.46.163.201 attack
Unauthorized SMTP/IMAP/POP3 connection attempt
2020-10-01 18:37:02
145.131.25.134 attack
2020-09-30T23:05:10.418302843Z wordpress(demeter.olimpo.tic.ufrj.br): Blocked username authentication attempt for admin from 145.131.25.134
...
2020-10-01 18:30:01
179.187.211.2 attackbots
20/9/30@16:34:52: FAIL: Alarm-Network address from=179.187.211.2
20/9/30@16:34:52: FAIL: Alarm-Network address from=179.187.211.2
...
2020-10-01 18:38:55

Recently Reported IPs

169.229.142.54 169.229.143.11 192.251.226.249 169.229.131.91
169.229.129.236 169.229.133.76 169.229.138.14 169.229.140.171
169.229.141.166 169.229.142.243 169.229.143.249 169.229.141.69
137.226.100.103 137.226.102.41 137.226.102.119 137.226.213.152
137.226.227.14 169.229.65.232 169.229.59.212 169.229.66.21