Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.150.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50024
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.150.249.		IN	A

;; AUTHORITY SECTION:
.			590	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061301 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 14 02:54:48 CST 2022
;; MSG SIZE  rcvd: 108
Host info
249.150.229.169.in-addr.arpa domain name pointer polisci-temp-150-249.ethnic.berkeley.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
249.150.229.169.in-addr.arpa	name = polisci-temp-150-249.ethnic.berkeley.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
180.76.114.218 attack
Mar 21 12:56:34 ip-172-31-62-245 sshd\[23885\]: Invalid user arch from 180.76.114.218\
Mar 21 12:56:37 ip-172-31-62-245 sshd\[23885\]: Failed password for invalid user arch from 180.76.114.218 port 60518 ssh2\
Mar 21 13:01:13 ip-172-31-62-245 sshd\[23915\]: Invalid user tiger from 180.76.114.218\
Mar 21 13:01:15 ip-172-31-62-245 sshd\[23915\]: Failed password for invalid user tiger from 180.76.114.218 port 33058 ssh2\
Mar 21 13:05:40 ip-172-31-62-245 sshd\[23946\]: Invalid user info from 180.76.114.218\
2020-03-21 22:46:58
45.40.194.129 attackspambots
Invalid user ansible from 45.40.194.129 port 37996
2020-03-21 23:15:34
129.211.173.161 attackspambots
Invalid user burinsky from 129.211.173.161 port 55590
2020-03-21 22:55:35
209.59.143.230 attackbotsspam
Unauthorized SSH login attempts
2020-03-21 23:24:40
218.50.4.41 attack
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-03-21 23:21:03
220.248.30.58 attackspam
Invalid user ubuntu from 220.248.30.58 port 62465
2020-03-21 23:20:06
139.59.124.118 attackspam
ssh brute force
2020-03-21 22:52:59
51.75.52.195 attackspam
Invalid user liuzhenfeng from 51.75.52.195 port 41516
2020-03-21 23:10:48
107.170.109.82 attackbots
Invalid user cinderella from 107.170.109.82 port 41347
2020-03-21 23:02:59
211.93.138.2 attackspambots
Mar 21 14:29:22 santamaria sshd\[28216\]: Invalid user discordbot from 211.93.138.2
Mar 21 14:29:22 santamaria sshd\[28216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.93.138.2
Mar 21 14:29:24 santamaria sshd\[28216\]: Failed password for invalid user discordbot from 211.93.138.2 port 50770 ssh2
...
2020-03-21 22:35:43
66.147.244.126 spam
Dear Ms.  ;
We compromised your devices and we have all your information related to your personal life and your adventures during travels (you know exactly what we mean). You have 24 hours to pay 50 USD, we do not want to expose you since we do not have any benefit doing troubles. We will delete everything related to you and leave you alone (sure 50 USD means nothing to you). If you want to contact the police you are free to do so and we are free to expose you too. We are not criminals, we just need some money, so be gentle and everything will pass safely for you. See how deep we know about you, if you want more we will email your advantures to your relatives:
Pay the 50 USD to XMR (if you face problems pay using Bitcoin) (find out in Google how to):
XMR: 46JJs5ttxR9jdNR2jmNiAbX5QtK3M9faBPPhh7WQwvrs8NLFpsagtZ3gnA6K6pSrm53JefbXGok6GTn7UexPHSBC2w2aN6j
Bitcoin: 3NQCHf924JYzU2LfziVpfrX9cvJGwTCmvi
You can buy XMR from https://localmonero.co/.

Received: from cmgw14.unifiedlayer.com (unknown [66.147.244.17])
	by soproxy11.mail.unifiedlayer.com (Postfix) with ESMTP id 3C4AB24B488
	for ; Fri, 20 Mar 2020 19:25:26 -0600 (MDT)
Received: from md-26.webhostbox.net ([208.91.199.22])
	by cmsmtp with ESMTP
	id FStBj4x60KxvrFStCj7sth; Fri, 20 Mar 2020 19:25:26 -0600
2020-03-21 23:29:23
197.156.65.138 attack
5x Failed Password
2020-03-21 23:26:03
101.99.29.254 attack
Invalid user om from 101.99.29.254 port 59666
2020-03-21 23:05:35
51.77.194.232 attackspambots
sshd jail - ssh hack attempt
2020-03-21 23:10:27
186.206.131.64 attack
Mar 20 20:47:34 h2034429 sshd[17743]: Invalid user nagios from 186.206.131.64
Mar 20 20:47:34 h2034429 sshd[17743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.131.64
Mar 20 20:47:36 h2034429 sshd[17743]: Failed password for invalid user nagios from 186.206.131.64 port 32864 ssh2
Mar 20 20:47:36 h2034429 sshd[17743]: Received disconnect from 186.206.131.64 port 32864:11: Bye Bye [preauth]
Mar 20 20:47:36 h2034429 sshd[17743]: Disconnected from 186.206.131.64 port 32864 [preauth]
Mar 20 21:04:54 h2034429 sshd[18098]: Invalid user uq from 186.206.131.64
Mar 20 21:04:54 h2034429 sshd[18098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.131.64
Mar 20 21:04:56 h2034429 sshd[18098]: Failed password for invalid user uq from 186.206.131.64 port 41294 ssh2
Mar 20 21:04:56 h2034429 sshd[18098]: Received disconnect from 186.206.131.64 port 41294:11: Bye Bye [preauth]
Mar 20 21:04........
-------------------------------
2020-03-21 23:29:51

Recently Reported IPs

169.229.158.38 137.226.203.108 137.226.217.218 169.229.53.149
169.229.55.135 169.229.145.196 169.229.144.218 169.229.230.126
169.229.148.39 169.229.147.51 169.229.222.131 169.229.176.220
169.229.243.67 137.226.12.168 192.227.140.125 180.76.119.63
137.226.244.20 137.226.243.95 137.226.247.119 169.229.25.49