Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.42.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16803
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.42.5.			IN	A

;; AUTHORITY SECTION:
.			409	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061302 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 14 04:56:30 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 5.42.229.169.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 5.42.229.169.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
115.74.203.235 attackbotsspam
Unauthorized connection attempt from IP address 115.74.203.235 on Port 445(SMB)
2020-05-30 19:25:06
195.206.105.217 attackbots
Brute Force Joomla Admin Login
2020-05-30 19:38:50
180.246.195.25 attack
Unauthorized connection attempt from IP address 180.246.195.25 on Port 445(SMB)
2020-05-30 19:06:24
81.23.111.234 attack
Unauthorized connection attempt from IP address 81.23.111.234 on Port 445(SMB)
2020-05-30 19:09:28
86.150.234.135 attackbots
Attempted to connect 2 times to port 80 TCP
2020-05-30 19:39:36
37.18.40.167 attackbotsspam
Invalid user djones from 37.18.40.167 port 53470
2020-05-30 19:36:42
106.111.132.104 attack
Unauthorized connection attempt detected from IP address 106.111.132.104 to port 2323
2020-05-30 19:22:30
114.237.155.5 attackbotsspam
SpamScore above: 10.0
2020-05-30 19:19:31
45.141.84.44 attackspambots
May 30 13:23:39 debian-2gb-nbg1-2 kernel: \[13096599.939660\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.141.84.44 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=2221 PROTO=TCP SPT=51478 DPT=7948 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-30 19:42:44
27.72.86.254 attack
Attempted connection to port 445.
2020-05-30 19:10:44
49.235.76.84 attackspam
Invalid user test6 from 49.235.76.84 port 42428
2020-05-30 19:18:35
164.132.201.87 attackbotsspam
WebFormToEmail Comment SPAM
2020-05-30 19:31:05
118.71.241.220 attackspambots
Unauthorized connection attempt from IP address 118.71.241.220 on Port 445(SMB)
2020-05-30 19:03:39
45.227.255.4 attackspam
May 30 12:31:55 h2646465 sshd[31409]: Invalid user admin from 45.227.255.4
May 30 12:31:55 h2646465 sshd[31409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.255.4
May 30 12:31:55 h2646465 sshd[31409]: Invalid user admin from 45.227.255.4
May 30 12:31:57 h2646465 sshd[31409]: Failed password for invalid user admin from 45.227.255.4 port 12703 ssh2
May 30 12:31:57 h2646465 sshd[31411]: Invalid user admin from 45.227.255.4
May 30 12:31:57 h2646465 sshd[31411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.255.4
May 30 12:31:57 h2646465 sshd[31411]: Invalid user admin from 45.227.255.4
May 30 12:31:59 h2646465 sshd[31411]: Failed password for invalid user admin from 45.227.255.4 port 15697 ssh2
May 30 12:32:00 h2646465 sshd[31417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.227.255.4  user=root
May 30 12:32:02 h2646465 sshd[31417]: Failed password for root from 45.227
2020-05-30 19:44:04
14.187.124.131 attackspam
Unauthorized connection attempt from IP address 14.187.124.131 on Port 445(SMB)
2020-05-30 19:26:02

Recently Reported IPs

169.229.29.93 137.226.213.90 137.226.204.109 137.226.215.88
137.226.211.221 89.223.67.13 137.226.217.121 137.226.214.113
169.229.52.108 112.132.124.182 169.229.56.24 169.229.107.48
169.229.109.99 169.229.101.57 169.229.144.210 169.229.145.232
169.229.244.91 169.229.244.73 137.226.15.7 169.229.42.162