Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.248.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17760
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.248.11.			IN	A

;; AUTHORITY SECTION:
.			162	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061302 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 14 06:53:58 CST 2022
;; MSG SIZE  rcvd: 107
Host info
11.248.229.169.in-addr.arpa domain name pointer warhawk.ist.berkeley.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
11.248.229.169.in-addr.arpa	name = warhawk.ist.berkeley.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.228.41.137 attackspambots
(AR/Argentina/-) SMTP Bruteforcing attempts
2020-06-05 19:50:46
49.232.174.219 attackspambots
$f2bV_matches
2020-06-05 19:53:26
118.165.128.67 attackbotsspam
Hits on port : 88
2020-06-05 19:32:09
218.78.10.183 attackbots
2020-06-05T11:59:31.866526abusebot-6.cloudsearch.cf sshd[11711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.10.183  user=root
2020-06-05T11:59:33.707824abusebot-6.cloudsearch.cf sshd[11711]: Failed password for root from 218.78.10.183 port 52798 ssh2
2020-06-05T12:02:44.020968abusebot-6.cloudsearch.cf sshd[11894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.10.183  user=root
2020-06-05T12:02:45.887338abusebot-6.cloudsearch.cf sshd[11894]: Failed password for root from 218.78.10.183 port 38290 ssh2
2020-06-05T12:03:30.225125abusebot-6.cloudsearch.cf sshd[11935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.10.183  user=root
2020-06-05T12:03:32.543252abusebot-6.cloudsearch.cf sshd[11935]: Failed password for root from 218.78.10.183 port 42534 ssh2
2020-06-05T12:04:13.435284abusebot-6.cloudsearch.cf sshd[11978]: pam_unix(sshd:auth): authe
...
2020-06-05 20:09:58
46.101.11.213 attack
Jun  5 16:23:05 gw1 sshd[15284]: Failed password for root from 46.101.11.213 port 46070 ssh2
...
2020-06-05 19:38:19
92.118.161.37 attackspam
 TCP (SYN) 92.118.161.37:62167 -> port 2323, len 44
2020-06-05 19:27:10
157.55.39.51 attackspam
Automatic report - Banned IP Access
2020-06-05 19:29:43
95.12.101.34 attackspam
Automatic report - Port Scan Attack
2020-06-05 19:28:55
112.85.42.194 attackspambots
2020-06-05T12:58:06.752186centos sshd[8137]: Failed password for root from 112.85.42.194 port 10011 ssh2
2020-06-05T12:58:09.248536centos sshd[8137]: Failed password for root from 112.85.42.194 port 10011 ssh2
2020-06-05T12:58:14.526469centos sshd[8137]: Failed password for root from 112.85.42.194 port 10011 ssh2
...
2020-06-05 19:36:29
190.196.226.172 attackspam
(AR/Argentina/-) SMTP Bruteforcing attempts
2020-06-05 20:07:08
37.187.72.146 attackspambots
Automatic report - WordPress Brute Force
2020-06-05 19:53:50
151.49.173.32 attackspam
Port Scan detected!
...
2020-06-05 20:03:25
58.210.197.234 attackspambots
Jun  5 05:52:46 mx sshd[27939]: Failed password for root from 58.210.197.234 port 38070 ssh2
2020-06-05 20:04:49
51.252.79.116 attackbots
Wordpress login scanning
2020-06-05 20:02:25
31.42.190.137 attackbotsspam
Tried sshing with brute force.
2020-06-05 19:35:16

Recently Reported IPs

169.229.210.125 169.229.252.68 169.229.252.166 169.229.252.76
169.229.253.154 169.229.253.72 169.229.253.192 159.5.28.100
169.229.254.248 169.229.255.124 242.147.78.115 169.229.255.251
111.206.198.4 111.206.198.78 111.206.198.188 111.206.221.104
111.206.198.232 111.206.221.134 42.3.207.31 112.47.16.176