Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.30.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14284
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.30.11.			IN	A

;; AUTHORITY SECTION:
.			217	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062500 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 25 17:55:24 CST 2022
;; MSG SIZE  rcvd: 106
Host info
11.30.229.169.in-addr.arpa domain name pointer fixed-169-229-30-11.soe.berkeley.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
11.30.229.169.in-addr.arpa	name = fixed-169-229-30-11.soe.berkeley.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
77.247.110.7 attackbotsspam
unauthorized connection attempt
2020-07-01 17:15:00
123.27.99.38 attackspambots
unauthorized connection attempt
2020-07-01 17:21:21
85.209.0.102 attack
SSH login attempts.
2020-07-01 16:51:32
61.147.103.140 attackbotsspam
[Tue May 26 00:07:04 2020] - Syn Flood From IP: 61.147.103.140 Port: 6000
2020-07-01 17:07:41
222.186.15.158 attackbotsspam
Jul  1 05:03:10 localhost sshd[1912697]: Disconnected from 222.186.15.158 port 41524 [preauth]
...
2020-07-01 17:22:54
112.78.3.248 attackspambots
112.78.3.248 - - [16/Jun/2020:16:53:05 +0200] "GET /wp-login.php HTTP/1.1" 302 536
...
2020-07-01 17:06:54
118.232.161.163 attackbots
Port probing on unauthorized port 81
2020-07-01 17:04:46
220.132.165.87 attackbotsspam
 TCP (SYN) 220.132.165.87:55589 -> port 23, len 40
2020-07-01 16:46:41
60.22.117.45 attackbots
23/tcp
[2020-06-30]1pkt
2020-07-01 17:16:06
192.241.224.202 attackspam
portscan
2020-07-01 17:20:59
61.147.103.136 attack
[MK-Root1] Blocked by UFW
2020-07-01 16:49:25
197.253.6.70 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-07-01 17:25:13
162.214.97.24 attackspam
TCP port : 10742
2020-07-01 17:13:08
42.247.5.82 attack
unauthorized connection attempt
2020-07-01 16:59:27
88.225.215.211 attack
unauthorized connection attempt
2020-07-01 17:23:54

Recently Reported IPs

169.229.66.127 137.226.234.41 137.226.254.90 137.226.181.146
137.226.11.61 178.252.175.3 20.126.8.45 137.226.7.26
43.154.177.223 137.226.1.179 34.66.157.172 89.163.224.166
137.226.13.127 137.226.12.188 137.226.13.107 34.118.101.191
43.154.180.144 34.66.208.65 169.229.65.98 169.229.138.148