Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nairobi

Region: Nairobi

Country: Kenya

Internet Service Provider: Airtel

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.6.149.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12551
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.6.149.22.			IN	A

;; AUTHORITY SECTION:
.			593	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023102100 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 21 20:03:12 CST 2023
;; MSG SIZE  rcvd: 105
Host info
Host 22.149.6.102.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 22.149.6.102.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.38.133.99 attack
Port scan on 1 port(s): 445
2020-09-16 22:10:45
137.74.219.113 attack
Failed password for root from 137.74.219.113 port 44958 ssh2
2020-09-16 21:55:14
64.225.64.215 attackbotsspam
Sep 16 13:21:14 onepixel sshd[375550]: Failed password for invalid user admin from 64.225.64.215 port 50724 ssh2
Sep 16 13:25:08 onepixel sshd[376136]: Invalid user arrezo from 64.225.64.215 port 34606
Sep 16 13:25:08 onepixel sshd[376136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.64.215 
Sep 16 13:25:08 onepixel sshd[376136]: Invalid user arrezo from 64.225.64.215 port 34606
Sep 16 13:25:10 onepixel sshd[376136]: Failed password for invalid user arrezo from 64.225.64.215 port 34606 ssh2
2020-09-16 22:07:24
179.209.101.93 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-09-16 22:11:38
196.28.226.146 attack
RDP Bruteforce
2020-09-16 22:20:57
106.54.42.50 attackspambots
RDP Bruteforce
2020-09-16 22:29:42
168.181.49.39 attack
Sep 16 14:16:58 hell sshd[31000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.181.49.39
Sep 16 14:17:00 hell sshd[31000]: Failed password for invalid user abuseio from 168.181.49.39 port 63962 ssh2
...
2020-09-16 22:09:09
218.212.73.83 attackspam
Sep 16 01:10:56 vps639187 sshd\[8408\]: Invalid user support from 218.212.73.83 port 53427
Sep 16 01:10:57 vps639187 sshd\[8408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.212.73.83
Sep 16 01:10:58 vps639187 sshd\[8408\]: Failed password for invalid user support from 218.212.73.83 port 53427 ssh2
...
2020-09-16 22:01:35
178.54.238.138 attackspam
Sep 15 16:05:27 scw-focused-cartwright sshd[9158]: Failed password for root from 178.54.238.138 port 49292 ssh2
2020-09-16 22:02:00
164.90.208.135 attackspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-16 21:59:58
185.120.249.209 attack
Unauthorized connection attempt from IP address 185.120.249.209 on Port 445(SMB)
2020-09-16 22:04:52
13.76.231.202 attackbots
Repeated RDP login failures. Last user: Asistente
2020-09-16 22:18:51
106.13.47.6 attackspam
invalid user
2020-09-16 22:04:33
188.131.233.36 attack
srv02 Mass scanning activity detected Target: 27680  ..
2020-09-16 22:08:47
129.211.185.209 attack
RDP Bruteforce
2020-09-16 22:27:23

Recently Reported IPs

102.57.68.234 102.6.57.92 102.58.9.237 102.58.5.107
102.58.245.63 102.57.59.237 102.58.183.104 102.57.62.232
102.58.162.62 102.58.80.181 102.57.79.69 102.59.21.60
102.57.88.31 102.57.93.247 102.57.243.201 102.57.82.155
102.58.108.185 102.6.141.209 102.57.195.0 102.57.214.185