Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.149.84.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10030
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.149.84.46.			IN	A

;; AUTHORITY SECTION:
.			125	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 19:13:29 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 46.84.149.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 46.84.149.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.190.92 attackbotsspam
port scan and connect, tcp 22 (ssh)
2020-01-25 04:43:28
85.132.53.234 attackspambots
1579869026 - 01/24/2020 13:30:26 Host: 85.132.53.234/85.132.53.234 Port: 445 TCP Blocked
2020-01-25 04:47:01
196.41.48.84 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-25 05:16:46
80.82.65.90 attack
01/24/2020-15:46:49.512626 80.82.65.90 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-25 04:47:27
115.71.233.64 attackbotsspam
Email rejected due to spam filtering
2020-01-25 05:10:34
79.170.185.146 attack
1579868942 - 01/24/2020 13:29:02 Host: 79.170.185.146/79.170.185.146 Port: 445 TCP Blocked
2020-01-25 04:50:52
103.110.89.148 attack
Invalid user guest from 103.110.89.148 port 59144
2020-01-25 04:46:36
138.197.166.110 attackspambots
Unauthorized connection attempt detected from IP address 138.197.166.110 to port 2220 [J]
2020-01-25 04:49:55
182.61.2.67 attackspam
Unauthorized connection attempt detected from IP address 182.61.2.67 to port 2220 [J]
2020-01-25 04:42:06
210.18.155.106 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-25 05:03:19
83.20.140.93 attackbotsspam
Jan 24 21:52:56 hell sshd[14610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.20.140.93
Jan 24 21:52:58 hell sshd[14610]: Failed password for invalid user dok from 83.20.140.93 port 56315 ssh2
...
2020-01-25 05:06:20
222.186.175.167 attack
scan z
2020-01-25 05:07:07
218.75.156.247 attackbots
Unauthorized connection attempt detected from IP address 218.75.156.247 to port 2220 [J]
2020-01-25 04:48:38
202.107.238.94 attackspam
Jan 24 22:10:57 mout sshd[2350]: Invalid user jared from 202.107.238.94 port 44538
2020-01-25 05:18:46
36.77.206.50 attackspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-01-25 04:55:13

Recently Reported IPs

152.46.72.90 161.14.232.14 133.43.41.243 139.87.221.30
129.87.77.93 159.41.104.170 121.181.12.71 213.176.128.106
193.252.243.39 103.122.129.126 114.148.231.117 249.136.224.30
156.46.247.5 193.105.179.74 91.238.58.59 145.192.213.220
176.31.81.111 204.95.91.27 161.177.32.161 162.236.203.214