Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.254.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38801
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.254.139.		IN	A

;; AUTHORITY SECTION:
.			557	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022063001 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 01 03:55:45 CST 2022
;; MSG SIZE  rcvd: 108
Host info
139.254.229.169.in-addr.arpa domain name pointer bfs-web-prd-01.is.berkeley.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.254.229.169.in-addr.arpa	name = bfs-web-prd-01.is.berkeley.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.78.53.37 attackbotsspam
SSH authentication failure x 6 reported by Fail2Ban
...
2019-11-12 01:05:48
50.125.87.117 attackbotsspam
Nov 11 17:19:33 game-panel sshd[29204]: Failed password for backup from 50.125.87.117 port 41816 ssh2
Nov 11 17:26:21 game-panel sshd[29405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.125.87.117
Nov 11 17:26:23 game-panel sshd[29405]: Failed password for invalid user mimura from 50.125.87.117 port 51748 ssh2
2019-11-12 01:34:13
180.76.157.48 attackspambots
Invalid user na from 180.76.157.48 port 34378
2019-11-12 01:21:55
185.176.27.242 attackspam
11/11/2019-17:48:12.862591 185.176.27.242 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-12 01:37:41
115.236.35.107 attack
Nov 11 07:08:11 sachi sshd\[23732\]: Invalid user nfs from 115.236.35.107
Nov 11 07:08:11 sachi sshd\[23732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.236.35.107
Nov 11 07:08:13 sachi sshd\[23732\]: Failed password for invalid user nfs from 115.236.35.107 port 59801 ssh2
Nov 11 07:12:51 sachi sshd\[24158\]: Invalid user postgres from 115.236.35.107
Nov 11 07:12:51 sachi sshd\[24158\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.236.35.107
2019-11-12 01:23:55
78.186.47.60 attackspam
Automatic report - Banned IP Access
2019-11-12 01:28:17
178.62.236.68 attack
WordPress login Brute force / Web App Attack on client site.
2019-11-12 01:22:58
112.199.221.124 attackspambots
" "
2019-11-12 01:01:23
173.245.239.249 attack
failed_logins
2019-11-12 01:37:13
68.183.178.162 attack
Nov 11 17:06:19 srv-ubuntu-dev3 sshd[9492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.178.162  user=root
Nov 11 17:06:21 srv-ubuntu-dev3 sshd[9492]: Failed password for root from 68.183.178.162 port 40306 ssh2
Nov 11 17:10:13 srv-ubuntu-dev3 sshd[9910]: Invalid user vnet from 68.183.178.162
Nov 11 17:10:13 srv-ubuntu-dev3 sshd[9910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.178.162
Nov 11 17:10:13 srv-ubuntu-dev3 sshd[9910]: Invalid user vnet from 68.183.178.162
Nov 11 17:10:15 srv-ubuntu-dev3 sshd[9910]: Failed password for invalid user vnet from 68.183.178.162 port 49070 ssh2
Nov 11 17:14:08 srv-ubuntu-dev3 sshd[10170]: Invalid user eternity from 68.183.178.162
Nov 11 17:14:08 srv-ubuntu-dev3 sshd[10170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.178.162
Nov 11 17:14:08 srv-ubuntu-dev3 sshd[10170]: Invalid user eternity from 6
...
2019-11-12 01:14:31
90.84.241.185 attackspam
Nov 11 16:56:46 serwer sshd\[28867\]: Invalid user ubuntu from 90.84.241.185 port 50852
Nov 11 16:56:46 serwer sshd\[28867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.84.241.185
Nov 11 16:56:48 serwer sshd\[28867\]: Failed password for invalid user ubuntu from 90.84.241.185 port 50852 ssh2
...
2019-11-12 01:12:37
173.245.52.134 attack
173.245.52.134 - - [11/Nov/2019:14:43:18 +0000] "POST /wp-login.php HTTP/1.1" 200 1449 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-11-12 01:30:26
89.36.220.145 attack
Nov 11 17:27:04 MK-Soft-Root2 sshd[10854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.36.220.145 
Nov 11 17:27:06 MK-Soft-Root2 sshd[10854]: Failed password for invalid user pelseneer from 89.36.220.145 port 37920 ssh2
...
2019-11-12 01:13:04
217.182.70.125 attack
Automatic report - Banned IP Access
2019-11-12 01:08:11
92.118.38.38 attackspambots
2019-11-11T18:22:17.178544mail01 postfix/smtpd[894]: warning: unknown[92.118.38.38]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-11T18:22:17.178984mail01 postfix/smtpd[11345]: warning: unknown[92.118.38.38]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-11T18:22:34.048568mail01 postfix/smtpd[894]: warning: unknown[92.118.38.38]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-12 01:24:39

Recently Reported IPs

169.229.162.196 169.229.169.115 180.76.207.247 180.76.96.89
169.229.214.173 180.76.149.188 9.13.78.233 180.76.97.137
180.76.170.64 180.76.158.226 180.76.178.160 180.76.145.199
137.226.183.71 180.76.184.32 131.161.9.52 180.76.14.19
180.76.137.101 131.161.9.21 180.76.56.127 137.226.218.93