Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Berkeley

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.15.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54336
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.15.34.			IN	A

;; AUTHORITY SECTION:
.			56	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061401 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 15 08:48:38 CST 2022
;; MSG SIZE  rcvd: 106
Host info
34.15.229.169.in-addr.arpa domain name pointer fixed-169-229-15-34.qb3.berkeley.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
34.15.229.169.in-addr.arpa	name = fixed-169-229-15-34.qb3.berkeley.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.253.251.210 attackspambots
Unauthorized connection attempt detected from IP address 187.253.251.210 to port 80 [J]
2020-02-04 03:18:23
52.142.218.250 attackspambots
Unauthorized connection attempt detected from IP address 52.142.218.250 to port 1433 [J]
2020-02-04 03:07:53
103.76.50.14 attackbotsspam
Feb  3 16:51:58 grey postfix/smtpd\[29877\]: NOQUEUE: reject: RCPT from unknown\[103.76.50.14\]: 554 5.7.1 Service unavailable\; Client host \[103.76.50.14\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=103.76.50.14\; from=\ to=\ proto=ESMTP helo=\<\[103.76.50.14\]\>
...
2020-02-04 03:04:29
172.104.144.136 attackspam
Unauthorized connection attempt detected from IP address 172.104.144.136 to port 789 [J]
2020-02-04 03:22:31
178.212.53.1 attackspambots
Unauthorized connection attempt detected from IP address 178.212.53.1 to port 8080 [J]
2020-02-04 03:21:08
80.38.198.179 attackspam
Unauthorized connection attempt detected from IP address 80.38.198.179 to port 23 [J]
2020-02-04 03:30:09
103.23.119.33 attack
Unauthorized connection attempt detected from IP address 103.23.119.33 to port 80 [J]
2020-02-04 03:28:06
179.60.215.253 attack
Unauthorized connection attempt detected from IP address 179.60.215.253 to port 22 [J]
2020-02-04 03:20:39
47.200.68.209 attackbots
Unauthorized connection attempt detected from IP address 47.200.68.209 to port 23 [J]
2020-02-04 03:33:40
64.225.33.153 attackspambots
$f2bV_matches
2020-02-04 03:31:34
121.204.166.240 attackspam
Unauthorized connection attempt detected from IP address 121.204.166.240 to port 2220 [J]
2020-02-04 02:59:27
101.255.36.146 attackspambots
Unauthorized connection attempt detected from IP address 101.255.36.146 to port 1433 [J]
2020-02-04 03:04:55
45.33.1.223 attackspam
Unauthorized connection attempt detected from IP address 45.33.1.223 to port 789 [J]
2020-02-04 03:34:58
172.95.161.66 attackbots
Unauthorized connection attempt detected from IP address 172.95.161.66 to port 23 [J]
2020-02-04 02:57:47
61.91.182.22 attackbotsspam
imap-login: Disconnected \(auth failed, 1 attempts in 4
2020-02-04 03:31:49

Recently Reported IPs

137.226.232.146 137.226.236.5 137.226.233.16 137.226.238.155
137.226.236.195 169.229.225.25 137.226.238.148 137.226.236.23
169.229.14.191 137.226.238.64 137.226.237.228 169.229.24.112
169.229.30.124 137.226.239.238 172.252.224.49 169.229.20.172
169.229.20.85 169.229.31.142 169.229.33.119 169.229.24.129