Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Berkeley

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.97.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42149
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.229.97.215.			IN	A

;; AUTHORITY SECTION:
.			560	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062801 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 29 12:00:59 CST 2022
;; MSG SIZE  rcvd: 107
Host info
215.97.229.169.in-addr.arpa domain name pointer man-97-215.reshall.berkeley.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
215.97.229.169.in-addr.arpa	name = man-97-215.reshall.berkeley.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
186.216.71.207 attackspambots
SSH invalid-user multiple login try
2020-07-09 03:07:52
202.72.215.58 attackbotsspam
Unauthorized connection attempt from IP address 202.72.215.58 on Port 445(SMB)
2020-07-09 02:44:55
188.65.132.246 attack
445/tcp
[2020-07-08]1pkt
2020-07-09 02:56:47
162.243.139.241 attackbotsspam
[Thu May 28 12:09:43 2020] - DDoS Attack From IP: 162.243.139.241 Port: 46028
2020-07-09 03:12:30
141.98.80.58 attackbots
20 attempts against mh-misbehave-ban on sonic
2020-07-09 02:43:10
34.92.105.128 attackbotsspam
Multiple SSH authentication failures from 34.92.105.128
2020-07-09 02:56:14
62.234.27.166 attackbots
5x Failed Password
2020-07-09 03:17:30
123.16.227.200 attack
Unauthorized connection attempt from IP address 123.16.227.200 on Port 445(SMB)
2020-07-09 02:51:08
61.74.234.245 attackbotsspam
2020-07-08T12:20:37.479222shield sshd\[25140\]: Invalid user hejt from 61.74.234.245 port 36047
2020-07-08T12:20:37.482873shield sshd\[25140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.74.234.245
2020-07-08T12:20:39.556954shield sshd\[25140\]: Failed password for invalid user hejt from 61.74.234.245 port 36047 ssh2
2020-07-08T12:22:01.952863shield sshd\[25577\]: Invalid user nagios from 61.74.234.245 port 45717
2020-07-08T12:22:01.957972shield sshd\[25577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.74.234.245
2020-07-09 03:03:42
144.217.94.188 attackspam
Automatic report - Banned IP Access
2020-07-09 03:11:06
49.230.133.110 attack
Unauthorized connection attempt from IP address 49.230.133.110 on Port 445(SMB)
2020-07-09 02:44:11
85.106.46.238 attack
Port Scan detected!
...
2020-07-09 03:09:24
193.112.126.64 attackbots
SSH bruteforce
2020-07-09 02:45:07
185.153.196.226 attack
DATE:2020-07-08 21:00:36, IP:185.153.196.226, PORT:3306 - MySQL/MariaDB brute force auth on a honeypot server (epe-dc)
2020-07-09 03:01:22
116.196.99.196 attack
Jul  7 18:07:06 pl3server sshd[17007]: Invalid user hartmut from 116.196.99.196 port 58302
Jul  7 18:07:06 pl3server sshd[17007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.99.196
Jul  7 18:07:08 pl3server sshd[17007]: Failed password for invalid user hartmut from 116.196.99.196 port 58302 ssh2
Jul  7 18:07:08 pl3server sshd[17007]: Received disconnect from 116.196.99.196 port 58302:11: Bye Bye [preauth]
Jul  7 18:07:08 pl3server sshd[17007]: Disconnected from 116.196.99.196 port 58302 [preauth]
Jul  7 18:17:00 pl3server sshd[26947]: Invalid user admin from 116.196.99.196 port 59404
Jul  7 18:17:00 pl3server sshd[26947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.99.196


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=116.196.99.196
2020-07-09 02:43:41

Recently Reported IPs

122.170.8.188 222.95.144.153 73.46.184.188 106.12.147.157
137.226.157.73 137.226.193.138 169.229.93.167 77.65.213.168
137.226.142.147 137.226.235.25 175.197.122.64 137.226.111.130
137.226.37.168 106.13.194.39 137.226.142.102 137.226.165.5
169.229.127.89 169.229.84.252 61.147.15.65 169.229.83.160