Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.105.57.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32947
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.105.57.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120801 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 09 03:55:51 CST 2024
;; MSG SIZE  rcvd: 107
Host info
149.57.105.119.in-addr.arpa domain name pointer KD119105057149.ppp-bb.dion.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.57.105.119.in-addr.arpa	name = KD119105057149.ppp-bb.dion.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.149.69.214 attackspam
1592741517 - 06/21/2020 14:11:57 Host: 49.149.69.214/49.149.69.214 Port: 445 TCP Blocked
2020-06-22 01:46:35
148.70.195.54 attackspam
Jun 21 14:12:02 odroid64 sshd\[14816\]: Invalid user jo from 148.70.195.54
Jun 21 14:12:02 odroid64 sshd\[14816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.195.54
...
2020-06-22 01:42:59
119.123.197.208 attack
Icarus honeypot on github
2020-06-22 01:28:16
72.166.243.197 attack
Jun 20 01:12:40 WHD8 dovecot: imap-login: Disconnected \(auth failed, 1 attempts in 4 secs\): user=\, method=PLAIN, rip=72.166.243.197, lip=10.64.89.208, TLS, session=\
Jun 20 05:26:12 WHD8 dovecot: imap-login: Disconnected \(auth failed, 1 attempts in 6 secs\): user=\, method=PLAIN, rip=72.166.243.197, lip=10.64.89.208, TLS: Disconnected, session=\
Jun 20 07:48:53 WHD8 dovecot: imap-login: Disconnected \(auth failed, 1 attempts in 5 secs\): user=\, method=PLAIN, rip=72.166.243.197, lip=10.64.89.208, TLS, session=\
Jun 20 08:30:18 WHD8 dovecot: imap-login: Disconnected \(auth failed, 1 attempts in 5 secs\): user=\, method=PLAIN, rip=72.166.243.197, lip=10.64.89.208, TLS: Disconnected, session=\
Jun 20 16:17:19 WHD8 dovecot: imap-login: Disconnected \(auth failed, 1 attempts in 4 secs\): 
...
2020-06-22 01:32:28
185.244.96.95 attackbots
Invalid user gamemaster from 185.244.96.95 port 49626
2020-06-22 01:49:36
45.226.50.245 attackbots
BR_EMPRESA DE SERVICOS ADM. DE ITUBERA LTD_<177>1592741510 [1:2403354:58145] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 28 [Classification: Misc Attack] [Priority: 2]:  {TCP} 45.226.50.245:62823
2020-06-22 01:52:03
219.250.188.134 attackspam
SSH brute-force: detected 42 distinct username(s) / 53 distinct password(s) within a 24-hour window.
2020-06-22 01:59:06
174.138.64.163 attackbots
[ssh] SSH attack
2020-06-22 01:51:05
83.97.20.35 attackspam
Unauthorized connection attempt detected from IP address 83.97.20.35 to port 13 [T]
2020-06-22 01:26:03
51.75.142.122 attack
2020-06-21T14:40:58.285973n23.at sshd[3764014]: Invalid user di from 51.75.142.122 port 46942
2020-06-21T14:41:00.332814n23.at sshd[3764014]: Failed password for invalid user di from 51.75.142.122 port 46942 ssh2
2020-06-21T14:47:20.384898n23.at sshd[3769109]: Invalid user dvd from 51.75.142.122 port 33998
...
2020-06-22 01:30:34
211.157.2.92 attack
Jun 21 08:17:06 mockhub sshd[22636]: Failed password for root from 211.157.2.92 port 52325 ssh2
...
2020-06-22 01:52:39
185.143.75.153 attackbotsspam
Jun 21 19:52:20 relay postfix/smtpd\[31921\]: warning: unknown\[185.143.75.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 21 19:52:46 relay postfix/smtpd\[21909\]: warning: unknown\[185.143.75.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 21 19:53:05 relay postfix/smtpd\[27590\]: warning: unknown\[185.143.75.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 21 19:53:31 relay postfix/smtpd\[21661\]: warning: unknown\[185.143.75.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 21 19:53:49 relay postfix/smtpd\[31921\]: warning: unknown\[185.143.75.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-22 01:54:51
122.166.192.26 attackbots
Jun 21 17:14:41 lnxmail61 sshd[18541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.166.192.26
Jun 21 17:14:43 lnxmail61 sshd[18541]: Failed password for invalid user ajc from 122.166.192.26 port 42068 ssh2
Jun 21 17:23:33 lnxmail61 sshd[19502]: Failed password for root from 122.166.192.26 port 55844 ssh2
2020-06-22 01:21:35
129.146.235.181 attackspam
Invalid user oscar from 129.146.235.181 port 44244
2020-06-22 01:31:59
46.161.27.75 attack
[MK-VM4] Blocked by UFW
2020-06-22 01:41:07

Recently Reported IPs

245.163.131.67 137.39.138.198 247.85.72.88 241.166.79.182
248.239.91.22 104.254.132.62 72.125.139.245 248.150.222.193
21.58.109.94 41.77.0.75 170.158.208.207 140.81.50.118
103.162.213.45 7.180.0.52 159.66.129.38 142.123.22.106
236.49.84.245 44.177.222.200 134.192.64.116 214.103.3.115