Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
1.20.149.146 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-02 01:28:49
1.20.149.201 attack
Unauthorised access (Nov  4) SRC=1.20.149.201 LEN=52 TTL=116 ID=7627 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-04 16:53:01
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.20.149.188
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 472
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.20.149.188.			IN	A

;; AUTHORITY SECTION:
.			310	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022400 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 24 19:57:51 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 188.149.20.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 188.149.20.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
1.173.224.78 attackbotsspam
[portscan] tcp/23 [TELNET]
in spfbl.net:'listed'
*(RWIN=37878)(10151156)
2019-10-16 01:17:48
144.217.197.7 attack
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(10151156)
2019-10-16 00:52:23
201.242.117.57 attack
[portscan] tcp/23 [TELNET]
in spfbl.net:'listed'
*(RWIN=15447)(10151156)
2019-10-16 01:20:51
156.219.41.94 attack
[portscan] tcp/23 [TELNET]
in spfbl.net:'listed'
*(RWIN=42775)(10151156)
2019-10-16 00:51:32
222.223.160.18 attack
[portscan] tcp/1433 [MsSQL]
in spfbl.net:'listed'
*(RWIN=1024)(10151156)
2019-10-16 00:46:05
184.154.47.3 attack
[portscan] tcp/3389 [MS RDP]
in spfbl.net:'listed'
*(RWIN=1024)(10151156)
2019-10-16 01:07:14
122.0.36.98 attack
[portscan] tcp/23 [TELNET]
*(RWIN=51201)(10151156)
2019-10-16 00:54:14
139.162.110.42 attackbots
Unauthorized connection attempt from IP address 139.162.110.42 on Port 3306(MYSQL)
2019-10-16 01:10:00
196.203.248.149 attack
The IP 196.203.248.149 has just been banned by Fail2Ban after
5 attempts against sshd.


Here is more information about 196.203.248.149 :

% This is the AfriNIC Whois server.

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '196.203.248.0 - 196.203.251.255'

% No abuse contact registered for 196.203.248.0 - 196.203.251.255

inetnum:        196.203.248.0 - 196.203.251.255
netname:        TOPNET-3
descr:          organisation : Topnet
descr:          contact name: Ahmed Kooli
descr:          phone: +216 71 780 900
descr:          e-mail: Ahmed@topnet.tn
descr:          website: http://topnet.tn
country:        TN
org:            ORG-ATIA2-AFRINIC
admin-c:        AK34-AFRINIC
tech-c:         AK34-AFRINIC
status:         SUB-ALLOCATED PA
mnt-by:         AFRINIC-HM-MNT
mnt-lower:      ATI-MNT
mnt-domains:    ATI-MNT
source:         AFRINIC # Filtered
parent:         196.203.0.0 - 196.203.255.255

organisation:   ORG-ATIA2-AFRINIC
org-name:       ATI - Agence Tunisienne Internet
org-type:       LIR
country:        TN
remarks:        data has been transferred from RIPE Whois Database 20050221
address:        13, rue Jughurta, Belvedere
address:        Tunis 1002
phone:          tel:+216-70-147-700
phone:          tel:+216-71-846-100
fax-no:         tel:+216-71-846-600
admin-c:        JF13-AFRINIC
tech-c:         TG12-AFRINIC
mnt-ref:        AFRINIC-HM-MNT
mnt-ref:        ATI-MNT
mnt-by:         AFRINIC-HM-MNT
source:         AFRINIC # Filtered

person:         Ahmed Kooli
address:        Centre Urbain Nord
address:        1073 Tunis
address:        TN
phone:          tel:+216-71-780-900
nic-hdl:        AK34-AFRINIC
mnt-by:         GENERATED-4YNEP8TTA1VHG1TEIFKF5ZSZ41FGKHTS-MNT
source:         AFRINIC # Filtered

Regards,

Fail2Ban
2019-10-16 00:55:19
203.150.142.132 attackspam
[portscan] tcp/23 [TELNET]
in spfbl.net:'listed'
*(RWIN=27379)(10151156)
2019-10-16 01:19:55
151.41.84.108 attackspam
[portscan] tcp/23 [TELNET]
in spfbl.net:'listed'
*(RWIN=15023)(10151156)
2019-10-16 01:09:29
84.10.24.10 attack
[portscan] tcp/23 [TELNET]
*(RWIN=14600)(10151156)
2019-10-16 01:13:38
46.107.87.248 attackbotsspam
[portscan] tcp/23 [TELNET]
in spfbl.net:'listed'
*(RWIN=51071)(10151156)
2019-10-16 01:01:32
113.90.246.200 attackbotsspam
[portscan] tcp/1433 [MsSQL]
[scan/connect: 2 time(s)]
in spfbl.net:'listed'
*(RWIN=8192)(10151156)
2019-10-16 01:11:28
61.9.33.222 attackspam
[portscan] tcp/23 [TELNET]
in spfbl.net:'listed'
*(RWIN=15040)(10151156)
2019-10-16 01:14:37

Recently Reported IPs

1.20.149.187 78.205.134.164 1.20.149.19 1.20.149.204
1.20.149.207 1.20.149.211 135.84.21.190 1.20.149.213
1.20.149.217 1.20.149.226 1.20.149.228 1.20.149.241
1.20.149.3 1.20.149.34 1.20.149.43 42.177.78.9
1.20.149.51 1.20.149.72 1.20.149.76 1.20.149.81