Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
1.20.149.146 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-02 01:28:49
1.20.149.201 attack
Unauthorised access (Nov  4) SRC=1.20.149.201 LEN=52 TTL=116 ID=7627 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-04 16:53:01
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.20.149.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14061
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.20.149.34.			IN	A

;; AUTHORITY SECTION:
.			409	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022400 1800 900 604800 86400

;; Query time: 132 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 24 19:58:28 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 34.149.20.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.149.20.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
197.220.163.230 attackbotsspam
 TCP (SYN) 197.220.163.230:50567 -> port 1433, len 40
2020-09-20 02:37:07
123.206.38.253 attack
Sep 19 18:37:19 abendstille sshd\[7675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.38.253  user=root
Sep 19 18:37:21 abendstille sshd\[7675\]: Failed password for root from 123.206.38.253 port 60486 ssh2
Sep 19 18:39:17 abendstille sshd\[9563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.38.253  user=root
Sep 19 18:39:19 abendstille sshd\[9563\]: Failed password for root from 123.206.38.253 port 52876 ssh2
Sep 19 18:41:11 abendstille sshd\[11690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.38.253  user=root
...
2020-09-20 03:08:59
45.142.120.183 attackspambots
2020-09-19T12:48:55.684302linuxbox-skyline auth[26471]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=s204 rhost=45.142.120.183
...
2020-09-20 02:55:42
61.177.172.61 attackbots
Sep 19 20:43:20 theomazars sshd[18246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.61  user=root
Sep 19 20:43:22 theomazars sshd[18246]: Failed password for root from 61.177.172.61 port 36339 ssh2
2020-09-20 02:43:31
149.56.129.68 attack
Invalid user helene from 149.56.129.68 port 58204
2020-09-20 03:05:02
41.79.78.59 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-09-20 02:33:28
106.13.176.220 attackbots
Sep 19 18:35:31 vps sshd[17767]: Failed password for root from 106.13.176.220 port 53850 ssh2
Sep 19 18:39:35 vps sshd[18062]: Failed password for root from 106.13.176.220 port 34318 ssh2
...
2020-09-20 02:54:16
123.190.119.249 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-09-20 03:01:21
72.42.170.60 attackbots
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-09-20 03:09:23
164.132.103.232 attackspam
2020-09-18T12:10:42.730007hostname sshd[39311]: Failed password for invalid user xjie from 164.132.103.232 port 52124 ssh2
...
2020-09-20 02:55:01
187.108.31.87 attackbotsspam
(smtpauth) Failed SMTP AUTH login from 187.108.31.87 (BR/Brazil/187.108.31.87-rev.tcheturbo.net.br): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SMTPAUTH; Logs: 2020-09-18 19:07:50 dovecot_login authenticator failed for (Alan) [187.108.31.87]:57125: 535 Incorrect authentication data (set_id=alanalonso)
2020-09-18 19:17:04 dovecot_login authenticator failed for (Alan) [187.108.31.87]:21585: 535 Incorrect authentication data (set_id=alanalonso)
2020-09-18 19:27:06 dovecot_login authenticator failed for (Alan) [187.108.31.87]:56996: 535 Incorrect authentication data (set_id=alanalonso)
2020-09-18 19:37:08 dovecot_login authenticator failed for (Alan) [187.108.31.87]:27966: 535 Incorrect authentication data (set_id=alanalonso)
2020-09-18 19:47:10 dovecot_login authenticator failed for (Alan) [187.108.31.87]:57190: 535 Incorrect authentication data (set_id=alanalonso)
2020-09-20 03:05:58
139.59.169.103 attackspam
2020-09-19T18:22:11.053498abusebot-7.cloudsearch.cf sshd[5595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.169.103  user=root
2020-09-19T18:22:12.713064abusebot-7.cloudsearch.cf sshd[5595]: Failed password for root from 139.59.169.103 port 55142 ssh2
2020-09-19T18:25:35.850413abusebot-7.cloudsearch.cf sshd[5615]: Invalid user user from 139.59.169.103 port 36294
2020-09-19T18:25:35.855177abusebot-7.cloudsearch.cf sshd[5615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.169.103
2020-09-19T18:25:35.850413abusebot-7.cloudsearch.cf sshd[5615]: Invalid user user from 139.59.169.103 port 36294
2020-09-19T18:25:37.519726abusebot-7.cloudsearch.cf sshd[5615]: Failed password for invalid user user from 139.59.169.103 port 36294 ssh2
2020-09-19T18:28:54.363106abusebot-7.cloudsearch.cf sshd[5776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.169.103
...
2020-09-20 02:41:24
178.128.217.58 attackspambots
Sep 19 20:22:16 sip sshd[6702]: Failed password for root from 178.128.217.58 port 39154 ssh2
Sep 19 20:27:35 sip sshd[8131]: Failed password for root from 178.128.217.58 port 60786 ssh2
2020-09-20 02:56:29
54.37.143.192 attackspam
Sep 19 20:28:32 ip106 sshd[25342]: Failed password for root from 54.37.143.192 port 58796 ssh2
...
2020-09-20 02:44:21
160.16.75.21 attackbotsspam
s3.hscode.pl - SSH Attack
2020-09-20 02:49:56

Recently Reported IPs

1.20.149.3 1.20.149.43 42.177.78.9 1.20.149.51
1.20.149.72 1.20.149.76 1.20.149.81 52.217.171.197
1.20.149.85 1.20.149.97 1.20.149.98 1.20.150.104
1.20.150.138 1.20.150.150 1.20.150.158 1.20.150.38
1.20.150.41 1.20.150.46 1.20.150.49 1.20.150.5