Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Fukuoka

Region: Hukuoka (Fukuoka)

Country: Japan

Internet Service Provider: KDDI Corporation

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.149.113.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52756
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.149.113.69.			IN	A

;; AUTHORITY SECTION:
.			545	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024092601 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 27 03:51:30 CST 2024
;; MSG SIZE  rcvd: 107
Host info
69.113.149.113.in-addr.arpa is an alias for 69.64h.113.149.113.in-addr.arpa.
69.64h.113.149.113.in-addr.arpa domain name pointer zz201840592171957145.userreverse.dion.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
69.113.149.113.in-addr.arpa	canonical name = 69.64h.113.149.113.in-addr.arpa.
69.64h.113.149.113.in-addr.arpa	name = zz201840592171957145.userreverse.dion.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.106.27 attackspambots
Invalid user ws from 106.13.106.27 port 51056
2020-04-20 21:45:49
106.54.83.45 attack
Apr 20 15:20:19 ovpn sshd\[18067\]: Invalid user ah from 106.54.83.45
Apr 20 15:20:19 ovpn sshd\[18067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.83.45
Apr 20 15:20:21 ovpn sshd\[18067\]: Failed password for invalid user ah from 106.54.83.45 port 37274 ssh2
Apr 20 15:40:28 ovpn sshd\[22765\]: Invalid user ftpuser from 106.54.83.45
Apr 20 15:40:28 ovpn sshd\[22765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.83.45
2020-04-20 21:44:19
51.77.148.77 attackbotsspam
$f2bV_matches
2020-04-20 22:01:37
52.151.27.166 attackbots
(sshd) Failed SSH login from 52.151.27.166 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 20 15:29:16 s1 sshd[8370]: Invalid user ep from 52.151.27.166 port 36034
Apr 20 15:29:18 s1 sshd[8370]: Failed password for invalid user ep from 52.151.27.166 port 36034 ssh2
Apr 20 15:51:20 s1 sshd[9514]: Invalid user dp from 52.151.27.166 port 58844
Apr 20 15:51:22 s1 sshd[9514]: Failed password for invalid user dp from 52.151.27.166 port 58844 ssh2
Apr 20 16:04:26 s1 sshd[10131]: Invalid user px from 52.151.27.166 port 54240
2020-04-20 22:00:23
88.218.17.217 attackbotsspam
Brute-force attempt banned
2020-04-20 21:51:12
14.29.241.29 attackbotsspam
Invalid user zabbix from 14.29.241.29 port 58128
2020-04-20 22:11:34
2.38.181.39 attack
Apr 20 15:56:16 vps647732 sshd[8264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.38.181.39
Apr 20 15:56:17 vps647732 sshd[8264]: Failed password for invalid user testuser from 2.38.181.39 port 38562 ssh2
...
2020-04-20 22:13:40
61.19.23.170 attackspambots
Brute force SMTP login attempted.
...
2020-04-20 21:58:56
5.135.94.191 attackspam
Invalid user admin from 5.135.94.191 port 47192
2020-04-20 22:12:27
80.211.23.64 attackspam
$f2bV_matches
2020-04-20 21:53:26
64.225.41.45 attackspam
$f2bV_matches
2020-04-20 21:57:27
79.137.34.248 attack
Invalid user test from 79.137.34.248 port 60120
2020-04-20 21:53:48
213.160.153.2 attackbots
Invalid user vf from 213.160.153.2 port 35172
2020-04-20 22:17:32
106.53.12.243 attackbots
Invalid user sg from 106.53.12.243 port 48692
2020-04-20 21:44:39
106.12.56.126 attackbots
Invalid user test from 106.12.56.126 port 50946
2020-04-20 21:47:30

Recently Reported IPs

113.149.33.253 113.146.49.113 113.146.165.120 113.147.95.149
113.147.146.123 113.143.15.81 113.15.241.200 113.149.127.242
113.143.91.41 113.146.238.239 113.146.33.29 113.149.32.221
113.15.215.197 113.149.23.94 113.149.247.218 113.149.96.4
113.15.22.129 113.147.253.243 113.147.93.167 113.146.38.98