Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Oakland

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.48.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50955
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.48.14.			IN	A

;; AUTHORITY SECTION:
.			137	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062400 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 24 21:21:12 CST 2022
;; MSG SIZE  rcvd: 106
Host info
14.48.229.169.in-addr.arpa domain name pointer rsgx4.millennium.berkeley.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.48.229.169.in-addr.arpa	name = rsgx4.millennium.berkeley.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
183.83.68.65 attackspam
Unauthorized connection attempt from IP address 183.83.68.65 on Port 445(SMB)
2020-03-24 03:41:33
114.88.240.50 attack
Netgear DGN Device Remote Command Execution Vulnerability
2020-03-24 03:45:49
45.64.195.147 attackbotsspam
Icarus honeypot on github
2020-03-24 03:40:11
200.241.189.34 attackspam
Invalid user bdc from 200.241.189.34 port 34459
2020-03-24 03:49:45
167.114.185.237 attack
Mar 23 20:01:10 DAAP sshd[358]: Invalid user lorenzo from 167.114.185.237 port 50584
Mar 23 20:01:10 DAAP sshd[358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.185.237
Mar 23 20:01:10 DAAP sshd[358]: Invalid user lorenzo from 167.114.185.237 port 50584
Mar 23 20:01:13 DAAP sshd[358]: Failed password for invalid user lorenzo from 167.114.185.237 port 50584 ssh2
Mar 23 20:06:56 DAAP sshd[397]: Invalid user test from 167.114.185.237 port 55076
...
2020-03-24 03:20:18
178.206.189.90 attackbotsspam
Unauthorized connection attempt from IP address 178.206.189.90 on Port 445(SMB)
2020-03-24 03:29:53
186.94.73.69 attackbots
Unauthorized connection attempt from IP address 186.94.73.69 on Port 445(SMB)
2020-03-24 03:54:55
185.165.168.229 attackspam
Mar 23 20:20:45 vpn01 sshd[29211]: Failed password for root from 185.165.168.229 port 46438 ssh2
Mar 23 20:21:08 vpn01 sshd[29211]: Failed password for root from 185.165.168.229 port 46438 ssh2
...
2020-03-24 03:28:10
177.47.252.120 attack
Unauthorized connection attempt from IP address 177.47.252.120 on Port 445(SMB)
2020-03-24 03:18:19
118.126.90.89 attackbots
Mar 23 12:18:39 NPSTNNYC01T sshd[2963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.90.89
Mar 23 12:18:41 NPSTNNYC01T sshd[2963]: Failed password for invalid user bb from 118.126.90.89 port 58218 ssh2
Mar 23 12:25:20 NPSTNNYC01T sshd[4122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.90.89
...
2020-03-24 03:25:41
112.85.42.186 attackspam
Mar 24 01:19:20 areeb-Workstation sshd[5435]: Failed password for root from 112.85.42.186 port 44455 ssh2
Mar 24 01:19:23 areeb-Workstation sshd[5435]: Failed password for root from 112.85.42.186 port 44455 ssh2
...
2020-03-24 03:50:38
106.12.179.81 attack
Brute-force attempt banned
2020-03-24 03:55:52
198.199.101.113 attack
Mar 23 13:16:51 ny01 sshd[4575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.101.113
Mar 23 13:16:52 ny01 sshd[4575]: Failed password for invalid user xiaoyu from 198.199.101.113 port 35572 ssh2
Mar 23 13:20:48 ny01 sshd[6191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.101.113
2020-03-24 03:52:16
142.129.152.171 attackspam
Automatic report - Port Scan Attack
2020-03-24 03:57:31
87.245.129.114 attack
Unauthorized connection attempt from IP address 87.245.129.114 on Port 445(SMB)
2020-03-24 03:38:20

Recently Reported IPs

169.229.93.154 31.214.255.111 169.229.26.58 169.229.24.199
169.229.26.190 169.229.24.245 169.229.48.93 169.229.48.6
169.229.92.148 169.229.93.23 47.125.160.221 72.14.179.10
31.53.222.242 137.226.31.117 169.229.94.67 24.116.43.111
169.229.92.64 34.124.222.110 169.229.92.71 169.229.93.216