Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Berkeley

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.30.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12918
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.30.4.			IN	A

;; AUTHORITY SECTION:
.			60	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062801 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 29 10:53:00 CST 2022
;; MSG SIZE  rcvd: 105
Host info
4.30.229.169.in-addr.arpa domain name pointer fixed-169-229-30-4.soe.berkeley.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
4.30.229.169.in-addr.arpa	name = fixed-169-229-30-4.soe.berkeley.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
27.147.186.123 attackbots
Sep 20 20:02:29 root sshd[7032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.147.186.123  user=root
Sep 20 20:02:30 root sshd[7032]: Failed password for root from 27.147.186.123 port 60205 ssh2
...
2020-09-21 21:53:22
129.204.203.218 attackbotsspam
Fail2Ban Ban Triggered
2020-09-21 21:47:20
156.96.47.16 attackspambots
37215/tcp
[2020-09-21]1pkt
2020-09-21 22:19:30
78.139.195.45 attackbotsspam
Port probing on unauthorized port 445
2020-09-21 21:51:12
177.139.194.62 attackspambots
2 SSH login attempts.
2020-09-21 21:57:56
218.92.0.251 attackspam
Sep 21 15:53:43 v22019058497090703 sshd[16246]: Failed password for root from 218.92.0.251 port 23622 ssh2
Sep 21 15:53:47 v22019058497090703 sshd[16246]: Failed password for root from 218.92.0.251 port 23622 ssh2
...
2020-09-21 21:59:57
203.218.158.176 attack
Sep 20 20:02:26 root sshd[6979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=pcd368176.netvigator.com  user=root
Sep 20 20:02:29 root sshd[6979]: Failed password for root from 203.218.158.176 port 36751 ssh2
...
2020-09-21 21:54:10
85.185.42.99 attackbotsspam
Unauthorized connection attempt from IP address 85.185.42.99 on Port 445(SMB)
2020-09-21 22:03:25
69.112.124.104 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-21 22:07:29
157.230.243.163 attackspam
$f2bV_matches
2020-09-21 22:20:56
83.170.242.46 attack
Unauthorized connection attempt from IP address 83.170.242.46 on Port 445(SMB)
2020-09-21 22:02:03
175.24.75.183 attackbots
Sep 21 11:38:05 ip-172-31-42-142 sshd\[28015\]: Failed password for root from 175.24.75.183 port 36428 ssh2\
Sep 21 11:40:03 ip-172-31-42-142 sshd\[28128\]: Invalid user test from 175.24.75.183\
Sep 21 11:40:05 ip-172-31-42-142 sshd\[28128\]: Failed password for invalid user test from 175.24.75.183 port 57276 ssh2\
Sep 21 11:42:04 ip-172-31-42-142 sshd\[28151\]: Failed password for root from 175.24.75.183 port 49860 ssh2\
Sep 21 11:44:04 ip-172-31-42-142 sshd\[28188\]: Invalid user user1 from 175.24.75.183\
2020-09-21 21:45:19
182.114.202.46 attack
Tried our host z.
2020-09-21 21:57:43
109.87.240.168 attack
Sep 20 20:02:16 root sshd[6878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.87.240.168  user=root
Sep 20 20:02:17 root sshd[6878]: Failed password for root from 109.87.240.168 port 41426 ssh2
...
2020-09-21 22:06:00
159.89.94.13 attackspam
scans 2 times in preceeding hours on the ports (in chronological order) 31716 31716
2020-09-21 21:44:28

Recently Reported IPs

169.229.130.228 169.229.144.98 169.229.143.198 169.229.1.51
169.229.57.37 137.226.172.150 177.74.66.121 137.226.227.192
137.226.226.12 137.226.181.10 137.226.249.55 137.226.200.62
137.226.180.162 137.226.200.162 169.229.123.242 169.229.73.180
169.229.71.178 169.229.73.232 169.229.71.183 169.229.121.27