Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Utase

Region: Tiba (Chiba)

Country: Japan

Internet Service Provider: KDDI Corporation

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.149.222.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54540
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.149.222.89.			IN	A

;; AUTHORITY SECTION:
.			20	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024092601 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 27 03:51:11 CST 2024
;; MSG SIZE  rcvd: 107
Host info
89.222.149.113.in-addr.arpa is an alias for 89.64h.222.149.113.in-addr.arpa.
89.64h.222.149.113.in-addr.arpa domain name pointer zz20194020067195DE59.userreverse.dion.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
89.222.149.113.in-addr.arpa	canonical name = 89.64h.222.149.113.in-addr.arpa.
89.64h.222.149.113.in-addr.arpa	name = zz20194020067195DE59.userreverse.dion.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
125.213.128.106 attackspambots
Apr 22 05:52:19 vmd48417 sshd[8183]: Failed password for root from 125.213.128.106 port 38534 ssh2
2020-04-22 16:11:33
159.203.70.169 attackspam
159.203.70.169 - - [22/Apr/2020:08:54:36 +0300] "POST /wp-login.php HTTP/1.1" 200 2174 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-22 16:24:02
123.24.148.9 attackbots
SSH-bruteforce attempts
2020-04-22 16:14:08
162.244.150.167 attackspambots
Unauthorized access detected from black listed ip!
2020-04-22 15:52:49
112.196.97.85 attack
Brute force attempt
2020-04-22 15:48:55
85.67.241.46 attackbots
Unauthorized IMAP connection attempt
2020-04-22 16:29:47
81.4.106.155 attack
$f2bV_matches
2020-04-22 16:17:07
185.47.65.30 attack
Apr 22 08:40:43 vps sshd[1002350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host30.router40.tygrys.net  user=root
Apr 22 08:40:44 vps sshd[1002350]: Failed password for root from 185.47.65.30 port 45838 ssh2
Apr 22 08:45:12 vps sshd[1024281]: Invalid user bj from 185.47.65.30 port 46816
Apr 22 08:45:12 vps sshd[1024281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host30.router40.tygrys.net
Apr 22 08:45:14 vps sshd[1024281]: Failed password for invalid user bj from 185.47.65.30 port 46816 ssh2
...
2020-04-22 16:00:22
168.91.45.0 attackbots
Unauthorized access detected from black listed ip!
2020-04-22 15:55:56
171.231.244.180 normal
tried to sign in my email account......
2020-04-22 16:04:36
31.184.199.114 attackbots
prod11
...
2020-04-22 15:54:49
122.51.195.104 attackspambots
$f2bV_matches
2020-04-22 16:07:06
192.169.190.108 attack
$f2bV_matches
2020-04-22 16:27:05
139.155.5.132 attackbotsspam
Apr 22 08:31:08 vmd17057 sshd[2147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.5.132 
Apr 22 08:31:10 vmd17057 sshd[2147]: Failed password for invalid user ubuntu from 139.155.5.132 port 48530 ssh2
...
2020-04-22 15:47:46
106.13.232.26 attackbots
2020-04-22T03:43:10.375220randservbullet-proofcloud-66.localdomain sshd[28014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.232.26  user=root
2020-04-22T03:43:13.002233randservbullet-proofcloud-66.localdomain sshd[28014]: Failed password for root from 106.13.232.26 port 49830 ssh2
2020-04-22T03:52:45.598247randservbullet-proofcloud-66.localdomain sshd[28053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.232.26  user=root
2020-04-22T03:52:47.161428randservbullet-proofcloud-66.localdomain sshd[28053]: Failed password for root from 106.13.232.26 port 55790 ssh2
...
2020-04-22 15:54:12

Recently Reported IPs

113.147.121.194 113.149.211.89 113.142.254.164 113.145.66.75
113.145.244.123 113.145.108.169 113.149.4.236 113.148.20.7
113.149.207.99 113.149.178.32 113.148.247.247 113.149.156.39
113.145.138.131 113.148.100.213 113.146.139.218 113.149.40.109
113.149.177.173 113.148.55.186 113.149.26.36 113.146.200.222