Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.2.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55702
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.2.12.			IN	A

;; AUTHORITY SECTION:
.			55	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061300 1800 900 604800 86400

;; Query time: 127 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 19:41:35 CST 2022
;; MSG SIZE  rcvd: 105
Host info
12.2.229.169.in-addr.arpa domain name pointer climate.geog.berkeley.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.2.229.169.in-addr.arpa	name = climate.geog.berkeley.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
120.142.100.34 attack
445/tcp 445/tcp
[2020-08-31]2pkt
2020-08-31 21:46:43
40.74.50.165 attack
URL Probing: /shop/user_artikel_handling_aufruf.php
2020-08-31 21:00:27
111.93.10.213 attackspambots
21 attempts against mh-ssh on echoip
2020-08-31 21:35:24
197.36.165.2 attackbotsspam
23/tcp
[2020-08-31]1pkt
2020-08-31 21:45:12
92.60.184.166 attackspam
31.08.2020 15:11:25 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2020-08-31 21:27:08
157.230.251.115 attack
Aug 31 15:23:27 abendstille sshd\[24919\]: Invalid user rajesh from 157.230.251.115
Aug 31 15:23:27 abendstille sshd\[24919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.251.115
Aug 31 15:23:29 abendstille sshd\[24919\]: Failed password for invalid user rajesh from 157.230.251.115 port 50998 ssh2
Aug 31 15:27:52 abendstille sshd\[29251\]: Invalid user beo from 157.230.251.115
Aug 31 15:27:52 abendstille sshd\[29251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.251.115
...
2020-08-31 21:43:14
190.114.253.241 attack
445/tcp 445/tcp
[2020-08-31]2pkt
2020-08-31 21:41:38
51.91.127.201 attackbots
Aug 31 15:54:08 pkdns2 sshd\[38123\]: Invalid user pokus from 51.91.127.201Aug 31 15:54:10 pkdns2 sshd\[38123\]: Failed password for invalid user pokus from 51.91.127.201 port 46178 ssh2Aug 31 15:57:38 pkdns2 sshd\[38286\]: Invalid user minecraft from 51.91.127.201Aug 31 15:57:40 pkdns2 sshd\[38286\]: Failed password for invalid user minecraft from 51.91.127.201 port 51980 ssh2Aug 31 16:01:04 pkdns2 sshd\[38470\]: Invalid user ssl from 51.91.127.201Aug 31 16:01:06 pkdns2 sshd\[38470\]: Failed password for invalid user ssl from 51.91.127.201 port 57850 ssh2
...
2020-08-31 21:21:49
112.85.42.89 attack
Aug 31 14:40:29 PorscheCustomer sshd[10309]: Failed password for root from 112.85.42.89 port 62695 ssh2
Aug 31 14:44:39 PorscheCustomer sshd[10348]: Failed password for root from 112.85.42.89 port 46234 ssh2
...
2020-08-31 20:56:32
77.65.17.2 attackspambots
Aug 31 14:33:18 nuernberg-4g-01 sshd[32728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.65.17.2 
Aug 31 14:33:20 nuernberg-4g-01 sshd[32728]: Failed password for invalid user sammy from 77.65.17.2 port 43872 ssh2
Aug 31 14:36:17 nuernberg-4g-01 sshd[1248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.65.17.2
2020-08-31 21:40:48
105.186.212.17 attack
445/tcp
[2020-08-31]1pkt
2020-08-31 20:56:49
60.241.53.60 attackspambots
21 attempts against mh-ssh on cloud
2020-08-31 21:31:45
39.106.146.102 attackspambots
xmlrpc attack
2020-08-31 21:06:40
203.204.188.11 attackbotsspam
Aug 31 15:07:23 ns381471 sshd[5175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.204.188.11
Aug 31 15:07:25 ns381471 sshd[5175]: Failed password for invalid user anna from 203.204.188.11 port 33722 ssh2
2020-08-31 21:12:29
103.83.9.254 attackbotsspam
1598877408 - 08/31/2020 14:36:48 Host: 103.83.9.254/103.83.9.254 Port: 445 TCP Blocked
2020-08-31 21:10:20

Recently Reported IPs

137.226.206.132 169.229.1.225 169.229.8.125 169.229.7.222
169.229.3.71 169.229.1.203 169.229.6.31 169.229.6.253
169.229.5.239 169.229.6.203 169.229.99.182 169.229.4.60
169.229.8.113 169.229.2.0 169.229.6.93 169.229.2.191
169.229.2.215 169.229.7.174 137.226.206.97 137.226.215.203