Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kantang

Region: Trang

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.1.149.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14469
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.1.149.55.			IN	A

;; AUTHORITY SECTION:
.			564	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022302 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 24 08:43:31 CST 2022
;; MSG SIZE  rcvd: 103
Host info
55.149.1.1.in-addr.arpa domain name pointer node-46v.pool-1-1.dynamic.totinternet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.149.1.1.in-addr.arpa	name = node-46v.pool-1-1.dynamic.totinternet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.60.183.4 attack
trying to access non-authorized port
2020-09-15 14:08:00
51.15.209.81 attack
2020-09-15T04:03:39.635861ionos.janbro.de sshd[99352]: Invalid user admin from 51.15.209.81 port 59058
2020-09-15T04:03:39.706326ionos.janbro.de sshd[99352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.209.81
2020-09-15T04:03:39.635861ionos.janbro.de sshd[99352]: Invalid user admin from 51.15.209.81 port 59058
2020-09-15T04:03:41.470715ionos.janbro.de sshd[99352]: Failed password for invalid user admin from 51.15.209.81 port 59058 ssh2
2020-09-15T04:08:08.560742ionos.janbro.de sshd[99373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.209.81  user=root
2020-09-15T04:08:09.922514ionos.janbro.de sshd[99373]: Failed password for root from 51.15.209.81 port 41734 ssh2
2020-09-15T04:11:43.211894ionos.janbro.de sshd[99380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.209.81  user=root
2020-09-15T04:11:45.421856ionos.janbro.de sshd[99380]: Failed 
...
2020-09-15 14:01:31
51.83.42.66 attackbotsspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-15 13:53:03
1.20.221.210 attackspambots
Unauthorized connection attempt from IP address 1.20.221.210 on Port 445(SMB)
2020-09-15 13:37:52
91.134.147.146 attackspambots
2020-09-15T07:03:26.893526ollin.zadara.org sshd[285604]: Failed password for root from 91.134.147.146 port 50636 ssh2
2020-09-15T07:07:10.743922ollin.zadara.org sshd[285814]: Invalid user user from 91.134.147.146 port 38456
...
2020-09-15 13:33:42
192.241.144.127 attack
Port scan denied
2020-09-15 14:07:32
51.68.71.102 attack
51.68.71.102 (FR/France/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 15 00:51:10 server2 sshd[23350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.54.170.118  user=root
Sep 15 00:48:04 server2 sshd[21616]: Failed password for root from 164.132.44.218 port 46022 ssh2
Sep 15 00:47:44 server2 sshd[21314]: Failed password for root from 149.56.13.111 port 51542 ssh2
Sep 15 00:47:28 server2 sshd[21215]: Failed password for root from 91.121.176.34 port 50028 ssh2
Sep 15 00:47:48 server2 sshd[21393]: Failed password for root from 51.68.71.102 port 51132 ssh2

IP Addresses Blocked:

156.54.170.118 (IT/Italy/-)
164.132.44.218 (FR/France/-)
149.56.13.111 (CA/Canada/-)
91.121.176.34 (FR/France/-)
2020-09-15 13:51:34
107.191.96.136 attackbots
Sep 15 06:39:45 router sshd[2938]: Failed password for root from 107.191.96.136 port 38318 ssh2
Sep 15 06:43:44 router sshd[3037]: Failed password for root from 107.191.96.136 port 52650 ssh2
...
2020-09-15 13:32:59
13.68.137.194 attackbotsspam
2020-09-14 20:22:19.769616-0500  localhost sshd[39924]: Failed password for invalid user macmac from 13.68.137.194 port 44130 ssh2
2020-09-15 14:10:54
213.87.44.152 attackbotsspam
2020-09-15T00:13:31.934214abusebot.cloudsearch.cf sshd[20245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.87.44.152  user=root
2020-09-15T00:13:33.769591abusebot.cloudsearch.cf sshd[20245]: Failed password for root from 213.87.44.152 port 60528 ssh2
2020-09-15T00:17:22.549118abusebot.cloudsearch.cf sshd[20358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.87.44.152  user=root
2020-09-15T00:17:25.096583abusebot.cloudsearch.cf sshd[20358]: Failed password for root from 213.87.44.152 port 43992 ssh2
2020-09-15T00:21:15.612808abusebot.cloudsearch.cf sshd[20595]: Invalid user support from 213.87.44.152 port 55692
2020-09-15T00:21:15.618760abusebot.cloudsearch.cf sshd[20595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.87.44.152
2020-09-15T00:21:15.612808abusebot.cloudsearch.cf sshd[20595]: Invalid user support from 213.87.44.152 port 55692
2020-09-1
...
2020-09-15 13:35:39
51.75.17.122 attackspam
Sep 15 00:44:18 prox sshd[19963]: Failed password for root from 51.75.17.122 port 38696 ssh2
Sep 15 00:55:40 prox sshd[31100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.17.122
2020-09-15 14:07:04
165.227.169.7 attackbotsspam
(sshd) Failed SSH login from 165.227.169.7 (DE/Germany/Hesse/Frankfurt am Main/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 15 00:42:59 atlas sshd[16665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.169.7  user=root
Sep 15 00:43:01 atlas sshd[16665]: Failed password for root from 165.227.169.7 port 33974 ssh2
Sep 15 00:53:55 atlas sshd[19403]: Invalid user filter from 165.227.169.7 port 41084
Sep 15 00:53:58 atlas sshd[19403]: Failed password for invalid user filter from 165.227.169.7 port 41084 ssh2
Sep 15 00:58:07 atlas sshd[20368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.169.7  user=root
2020-09-15 13:58:25
157.245.200.233 attackspambots
Sep 15 07:22:33 vmd26974 sshd[31414]: Failed password for root from 157.245.200.233 port 46982 ssh2
...
2020-09-15 13:48:25
54.36.99.205 attackbotsspam
B: Abusive ssh attack
2020-09-15 14:03:50
154.85.54.193 attackspambots
Sep 15 03:12:32 marvibiene sshd[891]: Failed password for root from 154.85.54.193 port 42984 ssh2
Sep 15 03:16:52 marvibiene sshd[1201]: Failed password for root from 154.85.54.193 port 56328 ssh2
2020-09-15 13:40:00

Recently Reported IPs

1.1.149.53 1.1.149.62 145.239.92.193 1.1.149.70
1.1.150.142 1.1.150.168 1.1.150.174 1.1.150.189
1.1.150.193 1.1.150.248 1.1.150.26 1.1.150.28
1.1.150.65 1.1.150.70 1.1.150.72 1.1.150.89
1.1.150.93 1.1.151.138 1.1.151.142 1.1.151.163