Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Oakland

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.193.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46331
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.193.130.		IN	A

;; AUTHORITY SECTION:
.			547	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062501 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 26 08:03:58 CST 2022
;; MSG SIZE  rcvd: 108
Host info
130.193.229.169.in-addr.arpa domain name pointer fixed-169-229-193-130.ls.berkeley.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.193.229.169.in-addr.arpa	name = fixed-169-229-193-130.ls.berkeley.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
194.15.36.33 attackbots
Sep  4 03:28:11 thevastnessof sshd[12444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.15.36.33
...
2019-09-04 13:17:35
139.199.80.67 attackspam
Sep  4 07:04:56 www sshd\[20579\]: Invalid user n from 139.199.80.67Sep  4 07:04:59 www sshd\[20579\]: Failed password for invalid user n from 139.199.80.67 port 52516 ssh2Sep  4 07:07:53 www sshd\[20732\]: Invalid user csserver from 139.199.80.67
...
2019-09-04 12:42:09
114.220.168.75 attack
Sep  3 20:31:04 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 114.220.168.75 port 45709 ssh2 (target: 158.69.100.136:22, password: dreambox)
Sep  3 20:31:04 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 114.220.168.75 port 45709 ssh2 (target: 158.69.100.136:22, password: system)
Sep  3 20:31:04 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 114.220.168.75 port 45709 ssh2 (target: 158.69.100.136:22, password: openelec)
Sep  3 20:31:05 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 114.220.168.75 port 45709 ssh2 (target: 158.69.100.136:22, password: welc0me)
Sep  3 20:31:05 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 114.220.168.75 port 45709 ssh2 (target: 158.69.100.136:22, password: 0000)
Sep  3 20:31:05 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 114.220.168.75 port 45709 ssh2 (target: 158.69.100.136:22, password: raspberrypi)
Sep  3 20:31:05 wildwolf ssh-honeypotd[26164]: Failed passw........
------------------------------
2019-09-04 13:04:30
165.22.250.67 attackbots
Sep  3 18:33:56 tdfoods sshd\[833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.250.67  user=root
Sep  3 18:33:58 tdfoods sshd\[833\]: Failed password for root from 165.22.250.67 port 59352 ssh2
Sep  3 18:39:54 tdfoods sshd\[1615\]: Invalid user gilles from 165.22.250.67
Sep  3 18:39:54 tdfoods sshd\[1615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.250.67
Sep  3 18:39:56 tdfoods sshd\[1615\]: Failed password for invalid user gilles from 165.22.250.67 port 53216 ssh2
2019-09-04 12:41:28
167.71.203.147 attack
Sep  4 06:28:16 meumeu sshd[4127]: Failed password for root from 167.71.203.147 port 40356 ssh2
Sep  4 06:35:52 meumeu sshd[5060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.203.147 
Sep  4 06:35:54 meumeu sshd[5060]: Failed password for invalid user clfs from 167.71.203.147 port 34614 ssh2
...
2019-09-04 12:40:54
73.171.226.23 attack
Sep  3 19:11:19 web1 sshd\[17864\]: Invalid user olivier from 73.171.226.23
Sep  3 19:11:19 web1 sshd\[17864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.171.226.23
Sep  3 19:11:21 web1 sshd\[17864\]: Failed password for invalid user olivier from 73.171.226.23 port 43196 ssh2
Sep  3 19:16:01 web1 sshd\[18468\]: Invalid user logger from 73.171.226.23
Sep  3 19:16:01 web1 sshd\[18468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.171.226.23
2019-09-04 13:24:25
152.250.82.38 attackbotsspam
Sep  4 08:03:21 taivassalofi sshd[166509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.250.82.38
Sep  4 08:03:23 taivassalofi sshd[166509]: Failed password for invalid user test from 152.250.82.38 port 49419 ssh2
...
2019-09-04 13:05:57
52.253.228.47 attack
Sep  4 07:03:32 taivassalofi sshd[165106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.253.228.47
Sep  4 07:03:34 taivassalofi sshd[165106]: Failed password for invalid user ftpuser from 52.253.228.47 port 1344 ssh2
...
2019-09-04 12:48:09
193.70.114.154 attack
Sep  4 04:50:32 web8 sshd\[15244\]: Invalid user sim from 193.70.114.154
Sep  4 04:50:32 web8 sshd\[15244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.114.154
Sep  4 04:50:34 web8 sshd\[15244\]: Failed password for invalid user sim from 193.70.114.154 port 48110 ssh2
Sep  4 04:54:52 web8 sshd\[17229\]: Invalid user testuser from 193.70.114.154
Sep  4 04:54:52 web8 sshd\[17229\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.114.154
2019-09-04 12:57:47
209.97.163.53 attackspam
Sep  3 18:27:08 hiderm sshd\[327\]: Invalid user reboot from 209.97.163.53
Sep  3 18:27:08 hiderm sshd\[327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.163.53
Sep  3 18:27:10 hiderm sshd\[327\]: Failed password for invalid user reboot from 209.97.163.53 port 54762 ssh2
Sep  3 18:31:56 hiderm sshd\[752\]: Invalid user admin from 209.97.163.53
Sep  3 18:31:56 hiderm sshd\[752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.163.53
2019-09-04 12:41:50
1.68.250.162 attack
port scan and connect, tcp 23 (telnet)
2019-09-04 12:37:08
27.109.17.18 attackbotsspam
Sep  4 06:25:24 OPSO sshd\[25098\]: Invalid user 123456 from 27.109.17.18 port 60718
Sep  4 06:25:24 OPSO sshd\[25098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.109.17.18
Sep  4 06:25:27 OPSO sshd\[25098\]: Failed password for invalid user 123456 from 27.109.17.18 port 60718 ssh2
Sep  4 06:30:38 OPSO sshd\[25900\]: Invalid user lamar from 27.109.17.18 port 49530
Sep  4 06:30:38 OPSO sshd\[25900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.109.17.18
2019-09-04 12:36:34
80.211.116.102 attackbots
Sep  4 05:32:37 ns341937 sshd[19874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.116.102
Sep  4 05:32:39 ns341937 sshd[19874]: Failed password for invalid user alva from 80.211.116.102 port 58159 ssh2
Sep  4 05:46:47 ns341937 sshd[22587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.116.102
...
2019-09-04 12:31:32
188.165.209.132 attackbotsspam
Web App Attack
2019-09-04 12:53:11
212.156.115.58 attackbotsspam
Sep  4 05:02:48 hb sshd\[24859\]: Invalid user contec from 212.156.115.58
Sep  4 05:02:48 hb sshd\[24859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.156.115.58
Sep  4 05:02:50 hb sshd\[24859\]: Failed password for invalid user contec from 212.156.115.58 port 57808 ssh2
Sep  4 05:07:57 hb sshd\[25342\]: Invalid user nadine from 212.156.115.58
Sep  4 05:07:57 hb sshd\[25342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.156.115.58
2019-09-04 13:12:20

Recently Reported IPs

180.76.26.173 169.229.193.199 180.76.26.208 137.226.149.153
137.226.149.209 137.226.160.177 216.152.249.221 137.226.125.246
137.226.76.22 159.223.52.199 137.226.176.134 137.226.175.248
137.226.177.235 137.226.180.198 137.226.181.164 137.226.193.204
137.226.194.19 137.226.193.235 137.226.149.219 137.226.176.125