Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 0.149.22.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44041
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;0.149.22.112.			IN	A

;; AUTHORITY SECTION:
.			346	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092501 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 26 06:09:54 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 112.22.149.0.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 112.22.149.0.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.161.242.223 attackspambots
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-07-15 08:23:26
109.203.192.124 attackspambots
Jul 14 23:46:53 onepixel sshd[1390573]: Invalid user nikita from 109.203.192.124 port 34795
Jul 14 23:46:53 onepixel sshd[1390573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.203.192.124 
Jul 14 23:46:53 onepixel sshd[1390573]: Invalid user nikita from 109.203.192.124 port 34795
Jul 14 23:46:56 onepixel sshd[1390573]: Failed password for invalid user nikita from 109.203.192.124 port 34795 ssh2
Jul 14 23:49:55 onepixel sshd[1392176]: Invalid user administrateur from 109.203.192.124 port 58704
2020-07-15 08:30:08
2.50.182.81 attackbotsspam
" "
2020-07-15 08:08:52
222.186.42.136 attack
Jul 15 02:10:59 piServer sshd[26617]: Failed password for root from 222.186.42.136 port 28004 ssh2
Jul 15 02:11:02 piServer sshd[26617]: Failed password for root from 222.186.42.136 port 28004 ssh2
Jul 15 02:11:13 piServer sshd[26630]: Failed password for root from 222.186.42.136 port 27366 ssh2
...
2020-07-15 08:19:28
116.232.82.37 attack
Jul 15 02:03:50 abendstille sshd\[17332\]: Invalid user dsp from 116.232.82.37
Jul 15 02:03:50 abendstille sshd\[17332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.232.82.37
Jul 15 02:03:52 abendstille sshd\[17332\]: Failed password for invalid user dsp from 116.232.82.37 port 43858 ssh2
Jul 15 02:06:46 abendstille sshd\[20364\]: Invalid user praktikant from 116.232.82.37
Jul 15 02:06:46 abendstille sshd\[20364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.232.82.37
...
2020-07-15 08:07:29
200.29.232.154 attack
Honeypot attack, port: 445, PTR: c20029232-154.consulnetworks.com.co.
2020-07-15 08:20:12
37.187.7.95 attackspam
Jul 15 02:08:59 mellenthin sshd[7157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.7.95
Jul 15 02:09:01 mellenthin sshd[7157]: Failed password for invalid user postgres from 37.187.7.95 port 42022 ssh2
2020-07-15 08:14:22
200.73.128.100 attackspam
Brute-force attempt banned
2020-07-15 08:31:46
68.66.192.30 attackspam
Jul 14 08:49:32 pixelmemory postfix/cleanup[2271473]: 672EF4011E: reject: header Reply-To:  from server.peesigma.com[68.66.192.30]; from= to= proto=ESMTP helo=: 5.7.1 Can not Reply-To world's largest spam host
2020-07-15 08:07:46
181.47.196.85 attack
2020-07-14T18:17:08.744993abusebot-3.cloudsearch.cf sshd[15745]: Invalid user ubuntu from 181.47.196.85 port 60897
2020-07-14T18:17:08.751951abusebot-3.cloudsearch.cf sshd[15745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.47.196.85
2020-07-14T18:17:08.744993abusebot-3.cloudsearch.cf sshd[15745]: Invalid user ubuntu from 181.47.196.85 port 60897
2020-07-14T18:17:10.729630abusebot-3.cloudsearch.cf sshd[15745]: Failed password for invalid user ubuntu from 181.47.196.85 port 60897 ssh2
2020-07-14T18:24:27.499657abusebot-3.cloudsearch.cf sshd[15834]: Invalid user xx from 181.47.196.85 port 50721
2020-07-14T18:24:27.506836abusebot-3.cloudsearch.cf sshd[15834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.47.196.85
2020-07-14T18:24:27.499657abusebot-3.cloudsearch.cf sshd[15834]: Invalid user xx from 181.47.196.85 port 50721
2020-07-14T18:24:29.750585abusebot-3.cloudsearch.cf sshd[15834]: Failed pa
...
2020-07-15 08:16:23
191.232.247.86 attackbots
SSH Invalid Login
2020-07-15 08:06:25
222.186.180.8 attack
Scanned 16 times in the last 24 hours on port 22
2020-07-15 08:26:44
178.33.229.120 attackbots
Jul  8 17:57:46 server sshd[17370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.229.120
Jul  8 17:57:47 server sshd[17370]: Failed password for invalid user asterisk from 178.33.229.120 port 36632 ssh2
Jul  8 18:13:18 server sshd[18765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.229.120
Jul  8 18:13:20 server sshd[18765]: Failed password for invalid user wuwanze from 178.33.229.120 port 37477 ssh2
2020-07-15 08:16:46
156.96.150.58 attackbots
Jul 14 12:35:22 *hidden* sshd[3559]: Invalid user lastresort from 156.96.150.58 port 46028 Jul 14 12:35:22 *hidden* sshd[3559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.96.150.58 Jul 14 12:35:22 *hidden* sshd[3559]: Invalid user lastresort from 156.96.150.58 port 46028 Jul 14 12:35:22 *hidden* sshd[3559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.96.150.58 Jul 14 12:35:22 *hidden* sshd[3559]: Invalid user lastresort from 156.96.150.58 port 46028 Jul 14 12:35:22 *hidden* sshd[3559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.96.150.58 Jul 14 12:35:25 *hidden* sshd[3559]: Failed password for invalid user lastresort from 156.96.150.58 port 46028 ssh2
2020-07-15 08:05:26
222.186.173.154 attackspambots
Scanned 41 times in the last 24 hours on port 22
2020-07-15 08:28:04

Recently Reported IPs

0.139.30.251 0.143.179.61 0.143.191.206 0.148.66.231
0.143.211.90 0.145.185.43 0.144.12.47 0.139.200.152
0.139.222.24 0.150.203.90 0.139.238.173 0.139.111.19
0.140.45.106 0.142.129.234 0.139.234.104 0.143.222.235
0.142.249.129 0.14.201.50 0.141.188.18 0.140.16.151