Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.0.149.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15508
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.0.149.11.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022302 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 24 07:02:00 CST 2022
;; MSG SIZE  rcvd: 103
Host info
11.149.0.1.in-addr.arpa domain name pointer node-45n.pool-1-0.dynamic.totinternet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
11.149.0.1.in-addr.arpa	name = node-45n.pool-1-0.dynamic.totinternet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
93.108.242.140 attack
Sep 28 16:55:34 pve1 sshd[19253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.108.242.140 
Sep 28 16:55:36 pve1 sshd[19253]: Failed password for invalid user noreply from 93.108.242.140 port 44053 ssh2
...
2020-09-29 03:27:29
198.50.177.42 attack
Sep 29 00:59:12 web1 sshd[17044]: Invalid user pt from 198.50.177.42 port 58926
Sep 29 00:59:12 web1 sshd[17044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.177.42
Sep 29 00:59:12 web1 sshd[17044]: Invalid user pt from 198.50.177.42 port 58926
Sep 29 00:59:14 web1 sshd[17044]: Failed password for invalid user pt from 198.50.177.42 port 58926 ssh2
Sep 29 01:16:23 web1 sshd[23032]: Invalid user misha from 198.50.177.42 port 46026
Sep 29 01:16:23 web1 sshd[23032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.177.42
Sep 29 01:16:23 web1 sshd[23032]: Invalid user misha from 198.50.177.42 port 46026
Sep 29 01:16:25 web1 sshd[23032]: Failed password for invalid user misha from 198.50.177.42 port 46026 ssh2
Sep 29 01:23:43 web1 sshd[25460]: Invalid user train1 from 198.50.177.42 port 53396
...
2020-09-29 03:33:38
207.6.31.101 attackbots
2020-09-27T20:33:58.651167vps1033 sshd[20175]: Invalid user admin from 207.6.31.101 port 59981
2020-09-27T20:33:58.745400vps1033 sshd[20175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.6.31.101
2020-09-27T20:33:58.651167vps1033 sshd[20175]: Invalid user admin from 207.6.31.101 port 59981
2020-09-27T20:34:00.621372vps1033 sshd[20175]: Failed password for invalid user admin from 207.6.31.101 port 59981 ssh2
2020-09-27T20:34:01.733732vps1033 sshd[20375]: Invalid user admin from 207.6.31.101 port 60155
...
2020-09-29 03:31:32
218.75.72.82 attack
sshd: Failed password for invalid user .... from 218.75.72.82 port 6807 ssh2 (5 attempts)
2020-09-29 03:21:15
175.205.111.109 attack
Sep 28 19:53:32 ourumov-web sshd\[1309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.205.111.109  user=pi
Sep 28 19:53:32 ourumov-web sshd\[1310\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.205.111.109  user=pi
Sep 28 19:53:34 ourumov-web sshd\[1309\]: Failed password for pi from 175.205.111.109 port 36124 ssh2
...
2020-09-29 03:07:17
186.18.41.1 attackspam
SSH login attempts.
2020-09-29 03:02:34
106.13.82.231 attack
Sep 29 00:29:37 itv-usvr-01 sshd[11989]: Invalid user usuario from 106.13.82.231
Sep 29 00:29:37 itv-usvr-01 sshd[11989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.82.231
Sep 29 00:29:37 itv-usvr-01 sshd[11989]: Invalid user usuario from 106.13.82.231
Sep 29 00:29:39 itv-usvr-01 sshd[11989]: Failed password for invalid user usuario from 106.13.82.231 port 45596 ssh2
Sep 29 00:35:29 itv-usvr-01 sshd[12264]: Invalid user deploy from 106.13.82.231
2020-09-29 03:09:16
83.48.96.245 attackspambots
Time:     Mon Sep 28 17:23:23 2020 +0000
IP:       83.48.96.245 (ES/Spain/245.red-83-48-96.staticip.rima-tde.net)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 28 17:01:48 1-1 sshd[45276]: Failed password for root from 83.48.96.245 port 40537 ssh2
Sep 28 17:15:35 1-1 sshd[45797]: Invalid user kang from 83.48.96.245 port 21914
Sep 28 17:15:37 1-1 sshd[45797]: Failed password for invalid user kang from 83.48.96.245 port 21914 ssh2
Sep 28 17:19:33 1-1 sshd[45957]: Failed password for root from 83.48.96.245 port 38389 ssh2
Sep 28 17:23:18 1-1 sshd[46116]: Invalid user vnc from 83.48.96.245 port 43405
2020-09-29 02:58:16
122.114.183.18 attack
SSH login attempts.
2020-09-29 03:09:52
167.114.98.96 attackbotsspam
Sep 29 03:45:20 web1 sshd[10016]: Invalid user 1 from 167.114.98.96 port 35818
Sep 29 03:45:20 web1 sshd[10016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.98.96
Sep 29 03:45:20 web1 sshd[10016]: Invalid user 1 from 167.114.98.96 port 35818
Sep 29 03:45:22 web1 sshd[10016]: Failed password for invalid user 1 from 167.114.98.96 port 35818 ssh2
Sep 29 03:57:02 web1 sshd[22639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.98.96  user=root
Sep 29 03:57:04 web1 sshd[22639]: Failed password for root from 167.114.98.96 port 37530 ssh2
Sep 29 04:01:59 web1 sshd[25115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.98.96  user=root
Sep 29 04:02:01 web1 sshd[25115]: Failed password for root from 167.114.98.96 port 45472 ssh2
Sep 29 04:06:31 web1 sshd[3574]: Invalid user 8 from 167.114.98.96 port 53412
...
2020-09-29 03:00:24
68.183.80.42 attackbots
Sep 28 06:08:21 online-web-1 sshd[2496250]: Invalid user test from 68.183.80.42 port 51054
Sep 28 06:08:21 online-web-1 sshd[2496250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.80.42
Sep 28 06:08:23 online-web-1 sshd[2496250]: Failed password for invalid user test from 68.183.80.42 port 51054 ssh2
Sep 28 06:08:23 online-web-1 sshd[2496250]: Received disconnect from 68.183.80.42 port 51054:11: Bye Bye [preauth]
Sep 28 06:08:23 online-web-1 sshd[2496250]: Disconnected from 68.183.80.42 port 51054 [preauth]
Sep 28 06:17:38 online-web-1 sshd[2497019]: Invalid user ali from 68.183.80.42 port 45520
Sep 28 06:17:38 online-web-1 sshd[2497019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.80.42
Sep 28 06:17:40 online-web-1 sshd[2497019]: Failed password for invalid user ali from 68.183.80.42 port 45520 ssh2
Sep 28 06:17:40 online-web-1 sshd[2497019]: Received disconnect from 68........
-------------------------------
2020-09-29 03:27:52
132.145.81.240 attackspambots
Invalid user postgres from 132.145.81.240 port 55070
2020-09-29 03:21:02
134.175.130.52 attackbots
2020-09-28T15:04:55.063627abusebot-5.cloudsearch.cf sshd[24397]: Invalid user anthony from 134.175.130.52 port 49950
2020-09-28T15:04:55.072240abusebot-5.cloudsearch.cf sshd[24397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.130.52
2020-09-28T15:04:55.063627abusebot-5.cloudsearch.cf sshd[24397]: Invalid user anthony from 134.175.130.52 port 49950
2020-09-28T15:04:57.792292abusebot-5.cloudsearch.cf sshd[24397]: Failed password for invalid user anthony from 134.175.130.52 port 49950 ssh2
2020-09-28T15:12:48.751720abusebot-5.cloudsearch.cf sshd[24449]: Invalid user liuhao from 134.175.130.52 port 45894
2020-09-28T15:12:48.761500abusebot-5.cloudsearch.cf sshd[24449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.130.52
2020-09-28T15:12:48.751720abusebot-5.cloudsearch.cf sshd[24449]: Invalid user liuhao from 134.175.130.52 port 45894
2020-09-28T15:12:50.748970abusebot-5.cloudsearch.cf sshd
...
2020-09-29 03:05:05
46.164.9.143 attack
Port Scan: TCP/443
2020-09-29 03:32:39
218.92.0.251 attack
Time:     Sun Sep 27 20:28:24 2020 +0000
IP:       218.92.0.251 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 27 20:28:09 29-1 sshd[15909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.251  user=root
Sep 27 20:28:11 29-1 sshd[15909]: Failed password for root from 218.92.0.251 port 24746 ssh2
Sep 27 20:28:15 29-1 sshd[15909]: Failed password for root from 218.92.0.251 port 24746 ssh2
Sep 27 20:28:18 29-1 sshd[15909]: Failed password for root from 218.92.0.251 port 24746 ssh2
Sep 27 20:28:21 29-1 sshd[15909]: Failed password for root from 218.92.0.251 port 24746 ssh2
2020-09-29 03:15:28

Recently Reported IPs

1.0.149.106 1.0.149.116 1.0.149.12 152.157.28.105
1.0.149.125 1.0.149.129 1.0.149.144 1.0.149.148
1.0.149.153 1.0.149.157 1.0.149.159 1.0.149.162
1.0.149.169 1.0.149.17 1.0.149.172 1.0.149.174
1.0.149.196 1.0.149.207 1.0.149.214 1.0.149.216