Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.52.15
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47918
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.52.15.			IN	A

;; AUTHORITY SECTION:
.			399	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061300 1800 900 604800 86400

;; Query time: 83 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 16:37:19 CST 2022
;; MSG SIZE  rcvd: 106
Host info
15.52.229.169.in-addr.arpa domain name pointer a-5.ih.berkeley.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
15.52.229.169.in-addr.arpa	name = a-5.ih.berkeley.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
191.232.236.96 attack
5x Failed Password
2020-09-20 05:34:53
106.12.45.32 attackspam
Port scan: Attack repeated for 24 hours
2020-09-20 05:31:27
49.116.190.65 attackbots
Port scan on 1 port(s): 52869
2020-09-20 05:26:26
121.69.89.78 attackbotsspam
Invalid user vbox from 121.69.89.78 port 49642
2020-09-20 05:14:36
23.129.64.191 attackspam
2020-09-19T20:35:16.142003server.espacesoutien.com sshd[1819]: Failed password for root from 23.129.64.191 port 58787 ssh2
2020-09-19T20:35:18.901941server.espacesoutien.com sshd[1819]: Failed password for root from 23.129.64.191 port 58787 ssh2
2020-09-19T20:35:20.690749server.espacesoutien.com sshd[1819]: Failed password for root from 23.129.64.191 port 58787 ssh2
2020-09-19T20:35:23.051929server.espacesoutien.com sshd[1819]: Failed password for root from 23.129.64.191 port 58787 ssh2
...
2020-09-20 05:33:36
223.16.58.90 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-20 05:27:30
125.46.88.101 attackspam
Found on   Binary Defense     / proto=6  .  srcport=3567  .  dstport=1433  .     (2315)
2020-09-20 05:12:47
134.122.79.190 attack
DATE:2020-09-19 19:02:13, IP:134.122.79.190, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-09-20 05:45:27
167.71.77.120 attack
2020-09-19 14:30:52.590004-0500  localhost sshd[38451]: Failed password for invalid user postgres from 167.71.77.120 port 37100 ssh2
2020-09-20 05:14:14
2405:201:5c05:6057:507:e79d:dc2f:1c0a attackbots
Auto reported by IDS
2020-09-20 05:23:34
14.99.176.210 attack
B: Abusive ssh attack
2020-09-20 05:14:56
95.71.136.202 attackbotsspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-20 05:10:54
178.62.227.247 attack
Sep 19 23:56:14 journals sshd\[106916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.227.247  user=root
Sep 19 23:56:15 journals sshd\[106916\]: Failed password for root from 178.62.227.247 port 12626 ssh2
Sep 20 00:00:01 journals sshd\[107353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.227.247  user=root
Sep 20 00:00:03 journals sshd\[107353\]: Failed password for root from 178.62.227.247 port 16741 ssh2
Sep 20 00:03:45 journals sshd\[109563\]: Invalid user postgres from 178.62.227.247
Sep 20 00:03:45 journals sshd\[109563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.227.247
...
2020-09-20 05:09:10
209.141.54.153 attackspam
Sep 19 17:16:52 vps46666688 sshd[6625]: Failed password for root from 209.141.54.153 port 43513 ssh2
Sep 19 17:17:03 vps46666688 sshd[6625]: error: maximum authentication attempts exceeded for root from 209.141.54.153 port 43513 ssh2 [preauth]
...
2020-09-20 05:39:23
14.43.116.195 attackspambots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-20 05:46:34

Recently Reported IPs

169.229.50.172 169.229.51.134 169.229.54.150 235.96.219.178
169.229.130.236 169.229.138.52 169.229.130.98 169.229.130.18
169.229.99.34 169.229.235.161 169.229.3.251 169.229.2.201
137.226.171.153 137.226.173.207 169.229.2.167 169.229.2.230
111.160.36.112 169.229.1.69 169.229.220.194 137.226.174.77