Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.215.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40031
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.215.122.		IN	A

;; AUTHORITY SECTION:
.			550	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062601 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 27 07:52:21 CST 2022
;; MSG SIZE  rcvd: 108
Host info
122.215.229.169.in-addr.arpa domain name pointer ewdc1slb-haas-vlan717.net.berkeley.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
122.215.229.169.in-addr.arpa	name = ewdc1slb-haas-vlan717.net.berkeley.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
27.148.190.100 attackspambots
Sep  8 02:08:15 ns381471 sshd[13455]: Failed password for root from 27.148.190.100 port 50748 ssh2
2020-09-08 08:12:18
192.241.184.22 attackspambots
Sep  7 18:43:53 inter-technics sshd[1770]: Invalid user tecmin from 192.241.184.22 port 43158
Sep  7 18:43:53 inter-technics sshd[1770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.184.22
Sep  7 18:43:53 inter-technics sshd[1770]: Invalid user tecmin from 192.241.184.22 port 43158
Sep  7 18:43:55 inter-technics sshd[1770]: Failed password for invalid user tecmin from 192.241.184.22 port 43158 ssh2
Sep  7 18:50:56 inter-technics sshd[2201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.184.22  user=root
Sep  7 18:50:58 inter-technics sshd[2201]: Failed password for root from 192.241.184.22 port 48486 ssh2
...
2020-09-08 08:13:42
45.162.4.67 attack
"$f2bV_matches"
2020-09-08 07:58:09
117.173.67.119 attack
Sep  7 18:51:48 fhem-rasp sshd[18583]: Connection closed by 117.173.67.119 port 3566 [preauth]
...
2020-09-08 07:32:49
182.150.57.34 attack
Invalid user vector from 182.150.57.34 port 4469
2020-09-08 08:11:10
134.209.164.184 attackbotsspam
Multiport scan 144 ports : 155 869 969 1046 1073 1104 1226 1228 1468 2232 2620 2631 2760 2831 3074 3130 3370 3637 4524 4585 4664 4675 4701 4964 5244 5375 5514 5796 5917 6056 6148 6831 6846 6952 7425 7616 7617 7824 7921 9022 9180 9505 9840 10250 10707 10894 11001 11384 11606 11657 11804 12157 12349 12418 12483 12899 13020 13055 14790 14893 15838 15959 16136 16303 16580 17046 17543 17627 18268 18369 18702 18933 18934(x2) 19328 19677 19716 20191 20223 20243 20258 20543 20828 20961 21039 21453 21804 22079 22217 22478 22853 23500 23941 24222 24248 24327 24334 24435 24590 24717 24760 24963 25504 25543 25687 25724 25824 26129 26132 26238 26413 26424 26493 26833 26876 27055 27315 27549 27729 27851 28275 28475 28562 28635 28643 28830 28923 29575 29635 29899 29964 30090 30577 30702 31050 31304 31392 31745 31779 31897 32149 32245 32413 32418 32643
2020-09-08 07:52:58
121.135.10.90 attack
Automatic report - Banned IP Access
2020-09-08 08:08:04
92.62.246.21 attackbots
Sep  7 18:51:16 ks10 sshd[895038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.62.246.21 
Sep  7 18:51:19 ks10 sshd[895038]: Failed password for invalid user netman from 92.62.246.21 port 46402 ssh2
...
2020-09-08 07:54:41
111.57.0.90 attackspambots
Sep  7 17:53:58 jumpserver sshd[47187]: Failed password for root from 111.57.0.90 port 48302 ssh2
Sep  7 17:55:25 jumpserver sshd[47210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.57.0.90  user=root
Sep  7 17:55:27 jumpserver sshd[47210]: Failed password for root from 111.57.0.90 port 34662 ssh2
...
2020-09-08 07:33:17
111.229.104.94 attackspambots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-08 08:05:51
200.121.230.225 attack
2020-09-07 18:51:06 1kFKMC-0000Ma-Nd SMTP connection from \(client-200.121.230.225.speedy.net.pe\) \[200.121.230.225\]:39524 I=\[193.107.88.166\]:25 closed by DROP in ACL
2020-09-07 18:51:25 1kFKMW-0000OL-1z SMTP connection from \(client-200.121.230.225.speedy.net.pe\) \[200.121.230.225\]:25149 I=\[193.107.88.166\]:25 closed by DROP in ACL
2020-09-07 18:51:36 1kFKMf-0000OZ-9K SMTP connection from \(client-200.121.230.225.speedy.net.pe\) \[200.121.230.225\]:37809 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-09-08 07:40:51
113.22.82.197 attack
Port probing on unauthorized port 445
2020-09-08 07:53:32
198.100.146.67 attack
198.100.146.67 (CA/Canada/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep  7 17:53:03 server2 sshd[18799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.90.64  user=root
Sep  7 17:52:25 server2 sshd[18223]: Failed password for root from 198.199.94.234 port 33141 ssh2
Sep  7 17:50:21 server2 sshd[17011]: Failed password for root from 122.14.195.58 port 55526 ssh2
Sep  7 17:50:19 server2 sshd[17011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.14.195.58  user=root
Sep  7 17:51:15 server2 sshd[17592]: Failed password for root from 198.100.146.67 port 33501 ssh2

IP Addresses Blocked:

68.183.90.64 (IN/India/-)
198.199.94.234 (US/United States/-)
122.14.195.58 (CN/China/-)
2020-09-08 07:43:35
45.142.120.121 attack
proto=tcp  .  spt=6172  .  dpt=25  .     Found on   Blocklist-de Strong List       (6)
2020-09-08 08:14:36
79.138.40.22 attackbots
SSH_scan
2020-09-08 07:53:59

Recently Reported IPs

169.229.215.205 169.229.214.203 169.229.216.168 137.226.222.92
169.229.63.149 137.226.223.157 137.226.222.210 169.229.63.124
137.226.229.181 137.226.231.255 137.226.225.157 137.226.224.128
137.226.227.46 169.229.44.243 137.226.227.252 180.76.98.223
209.141.37.136 137.226.82.182 137.226.126.193 137.226.67.77