Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Multicast Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 229.1.160.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45077
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;229.1.160.219.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 14:10:34 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 219.160.1.229.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 219.160.1.229.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.96.47.2 attackspam
Port Scan: TCP/445
2019-08-24 12:47:31
67.233.98.131 attackspam
Port Scan: UDP/137
2019-08-24 13:04:21
120.33.83.39 attackspam
Port Scan: TCP/5431
2019-08-24 12:23:17
213.150.207.5 attackspambots
Aug 24 07:27:45 pkdns2 sshd\[50391\]: Address 213.150.207.5 maps to smtp.bronbergwisp.co.za, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Aug 24 07:27:45 pkdns2 sshd\[50391\]: Invalid user ft from 213.150.207.5Aug 24 07:27:47 pkdns2 sshd\[50391\]: Failed password for invalid user ft from 213.150.207.5 port 53696 ssh2Aug 24 07:33:14 pkdns2 sshd\[50677\]: Address 213.150.207.5 maps to smtp.bronbergwisp.co.za, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Aug 24 07:33:14 pkdns2 sshd\[50677\]: Invalid user mia from 213.150.207.5Aug 24 07:33:15 pkdns2 sshd\[50677\]: Failed password for invalid user mia from 213.150.207.5 port 43038 ssh2
...
2019-08-24 12:44:11
132.148.25.20 attackspambots
Port Scan: TCP/445
2019-08-24 12:20:19
220.141.117.216 attackspambots
Port Scan: TCP/23
2019-08-24 12:42:49
124.119.52.215 attackspambots
Port Scan: TCP/22
2019-08-24 12:21:05
138.128.242.143 attackspambots
Port Scan: TCP/445
2019-08-24 12:20:00
42.86.158.96 attack
Port Scan: TCP/52869
2019-08-24 13:07:00
171.15.186.118 attack
Port Scan: TCP/8080
2019-08-24 12:52:20
59.54.137.11 attackbots
Port Scan: TCP/21
2019-08-24 12:37:35
50.63.14.7 attackbots
Port Scan: TCP/445
2019-08-24 13:06:29
122.52.168.241 attack
Port Scan: TCP/8291
2019-08-24 12:55:42
171.90.231.98 attackbots
Port Scan: TCP/21
2019-08-24 12:17:54
172.5.78.248 attackbots
Port Scan: UDP/925
2019-08-24 12:51:58

Recently Reported IPs

189.73.106.244 24.152.91.127 93.215.14.143 161.38.73.101
193.43.4.220 72.28.244.46 43.135.36.245 240.58.173.249
76.168.173.195 225.65.31.50 254.218.92.73 75.85.231.11
80.17.81.92 34.94.128.124 245.3.157.206 187.237.101.139
150.58.70.104 142.194.12.241 231.210.179.118 63.39.101.116