Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.68.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51228
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.68.149.			IN	A

;; AUTHORITY SECTION:
.			525	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062501 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 26 06:29:29 CST 2022
;; MSG SIZE  rcvd: 107
Host info
149.68.229.169.in-addr.arpa domain name pointer reserved-169-229-68-149.dhcp.berkeley.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.68.229.169.in-addr.arpa	name = reserved-169-229-68-149.dhcp.berkeley.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
163.172.160.199 attackbots
2020-08-14 22:35:21
103.9.0.209 attack
Aug 14 06:26:02 Host-KLAX-C sshd[18481]: User root from 103.9.0.209 not allowed because not listed in AllowUsers
...
2020-08-14 22:26:21
104.245.145.21 attackspambots
2020-08-14 22:58:21
134.90.149.146 attack
2020-08-14 22:51:59
61.92.251.82 attack
Automatic report - Banned IP Access
2020-08-14 22:26:48
24.50.70.65 attackspambots
Aug 14 14:13:57 extapp sshd[16878]: Invalid user admin from 24.50.70.65
Aug 14 14:13:59 extapp sshd[16878]: Failed password for invalid user admin from 24.50.70.65 port 51389 ssh2
Aug 14 14:14:02 extapp sshd[16880]: Failed password for r.r from 24.50.70.65 port 51546 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=24.50.70.65
2020-08-14 22:23:42
184.75.211.141 attack
2020-08-14 22:20:38
193.112.72.251 attack
Invalid user chao from 193.112.72.251 port 59652
2020-08-14 22:31:44
165.227.119.186 attack
2020-08-14 22:34:06
138.197.11.148 attack
2020-08-14 22:47:18
113.176.89.116 attack
Aug 14 15:23:39 rocket sshd[31333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.176.89.116
Aug 14 15:23:42 rocket sshd[31333]: Failed password for invalid user compaq from 113.176.89.116 port 51580 ssh2
Aug 14 15:27:50 rocket sshd[31868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.176.89.116
...
2020-08-14 22:29:05
185.102.219.171 attackbotsspam
2020-08-14 22:19:33
184.75.211.131 attackspambots
2020-08-14 22:21:19
142.93.187.214 attackspam
2020-08-14 22:43:26
218.92.0.250 attackbots
Aug 14 10:19:43 plusreed sshd[3869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.250  user=root
Aug 14 10:19:44 plusreed sshd[3869]: Failed password for root from 218.92.0.250 port 61697 ssh2
Aug 14 10:19:48 plusreed sshd[3869]: Failed password for root from 218.92.0.250 port 61697 ssh2
Aug 14 10:19:43 plusreed sshd[3869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.250  user=root
Aug 14 10:19:44 plusreed sshd[3869]: Failed password for root from 218.92.0.250 port 61697 ssh2
Aug 14 10:19:48 plusreed sshd[3869]: Failed password for root from 218.92.0.250 port 61697 ssh2
...
2020-08-14 22:25:23

Recently Reported IPs

94.178.143.7 62.182.254.99 135.174.228.139 136.35.139.19
45.61.163.159 201.18.74.39 169.229.68.195 130.77.158.218
56.83.113.63 137.226.206.197 137.226.210.89 169.229.37.163
169.229.14.249 186.125.169.112 187.146.254.235 137.226.57.137
137.226.74.244 247.32.72.91 196.109.166.77 73.92.110.31