Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspambots
Unauthorized connection attempt detected from IP address 116.149.240.54 to port 23 [T]
2020-03-24 20:13:54
Comments on same subnet:
IP Type Details Datetime
116.149.240.174 attackbotsspam
Unauthorized connection attempt detected from IP address 116.149.240.174 to port 23 [T]
2020-05-09 02:23:59
116.149.240.94 attackspambots
Unauthorized connection attempt detected from IP address 116.149.240.94 to port 23 [T]
2020-05-06 07:41:00
116.149.240.209 attackbots
Automatic report - Port Scan Attack
2020-04-06 02:06:45
116.149.240.153 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-11 07:29:43
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.149.240.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49290
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;116.149.240.54.			IN	A

;; AUTHORITY SECTION:
.			454	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020032400 1800 900 604800 86400

;; Query time: 101 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 20:13:45 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 54.240.149.116.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.240.149.116.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.240.220.187 attack
Automatic report - Port Scan Attack
2019-09-03 03:05:11
54.242.159.150 attackspam
Port Scan: TCP/443
2019-09-03 03:24:08
54.91.28.214 attack
Port Scan: TCP/443
2019-09-03 03:24:42
210.21.102.4 attack
Port Scan: UDP/49153
2019-09-03 03:13:27
112.242.16.39 attackbotsspam
Port Scan: TCP/8080
2019-09-03 03:04:46
161.77.42.54 attackbotsspam
Port Scan: UDP/137
2019-09-03 03:18:13
84.236.23.167 attackspam
Port Scan: TCP/445
2019-09-03 02:52:02
197.234.132.115 attack
SSH invalid-user multiple login try
2019-09-03 02:47:31
208.80.211.155 attackspam
Port Scan: UDP/137
2019-09-03 02:45:39
209.250.230.20 attack
Port Scan: TCP/443
2019-09-03 02:44:53
41.32.252.46 attackbotsspam
Port Scan: TCP/88
2019-09-03 02:41:06
64.202.191.159 attackbotsspam
Port Scan: TCP/445
2019-09-03 02:53:57
180.141.203.31 attackbotsspam
Sep  2 02:15:03 delbain2 sshd[15621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.141.203.31  user=r.r
Sep  2 02:15:05 delbain2 sshd[15621]: Failed password for r.r from 180.141.203.31 port 55222 ssh2
Sep  2 02:15:07 delbain2 sshd[15621]: Failed password for r.r from 180.141.203.31 port 55222 ssh2
Sep  2 02:15:09 delbain2 sshd[15621]: Failed password for r.r from 180.141.203.31 port 55222 ssh2
Sep  2 02:15:11 delbain2 sshd[15621]: Failed password for r.r from 180.141.203.31 port 55222 ssh2
Sep  2 02:15:14 delbain2 sshd[15621]: Failed password for r.r from 180.141.203.31 port 55222 ssh2
Sep  2 02:15:16 delbain2 sshd[15621]: Failed password for r.r from 180.141.203.31 port 55222 ssh2
Sep  2 02:15:16 delbain2 sshd[15621]: error: maximum authentication attempts exceeded for r.r from 180.141.203.31 port 55222 ssh2 [preauth]
Sep  2 02:15:16 delbain2 sshd[15621]: Disconnecting authenticating user r.r 180.141.203.31 port 55222: To........
-------------------------------
2019-09-03 02:59:47
162.210.161.155 attack
Port Scan: UDP/137
2019-09-03 03:01:32
187.188.147.152 attackspambots
Port Scan: TCP/8080
2019-09-03 03:14:47

Recently Reported IPs

14.4.167.30 1.55.55.162 1.52.119.206 1.20.141.126
223.79.178.203 210.71.153.19 185.54.178.229 183.81.78.153
180.218.242.186 180.163.225.24 180.125.116.105 175.23.73.156
175.6.228.146 145.255.2.212 125.177.108.133 125.120.1.121
125.88.181.107 124.228.221.75 124.65.136.238 124.11.80.90