Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.149.146.95
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51171
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.149.146.95.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 01:45:16 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 95.146.149.119.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 95.146.149.119.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.31.26.140 attackspam
2020-09-27 UTC: (2x) - 1111(2x)
2020-09-28 22:55:17
106.12.106.34 attackbotsspam
Fail2Ban Ban Triggered
2020-09-28 23:18:27
112.85.42.122 attack
Sep 28 08:20:11 serwer sshd\[32045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.122  user=root
Sep 28 08:20:14 serwer sshd\[32045\]: Failed password for root from 112.85.42.122 port 63674 ssh2
Sep 28 08:20:17 serwer sshd\[32045\]: Failed password for root from 112.85.42.122 port 63674 ssh2
Sep 28 08:20:20 serwer sshd\[32045\]: Failed password for root from 112.85.42.122 port 63674 ssh2
Sep 28 08:20:23 serwer sshd\[32045\]: Failed password for root from 112.85.42.122 port 63674 ssh2
Sep 28 08:20:27 serwer sshd\[32045\]: Failed password for root from 112.85.42.122 port 63674 ssh2
Sep 28 08:20:27 serwer sshd\[32045\]: error: maximum authentication attempts exceeded for root from 112.85.42.122 port 63674 ssh2 \[preauth\]
Sep 28 08:20:31 serwer sshd\[32082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.122  user=root
Sep 28 08:20:32 serwer sshd\[32082\]: Failed password for ro
...
2020-09-28 23:07:54
124.156.136.112 attackspambots
Sep 28 15:34:28 server sshd[2502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.136.112
Sep 28 15:34:30 server sshd[2502]: Failed password for invalid user user from 124.156.136.112 port 48102 ssh2
Sep 28 15:49:37 server sshd[3419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.136.112
Sep 28 15:49:39 server sshd[3419]: Failed password for invalid user alumni from 124.156.136.112 port 39478 ssh2
2020-09-28 23:11:30
196.52.43.64 attack
58603/tcp 1717/tcp 2082/tcp...
[2020-07-28/09-26]91pkt,68pt.(tcp),4pt.(udp)
2020-09-28 23:26:32
175.163.108.58 attackbots
Tried our host z.
2020-09-28 23:27:37
192.241.223.72 attackbotsspam
firewall-block, port(s): 27017/tcp
2020-09-28 23:06:48
184.105.247.211 attack
Port scan: Attack repeated for 24 hours
2020-09-28 23:06:34
123.206.64.111 attackbots
$f2bV_matches
2020-09-28 23:30:29
216.218.206.74 attack
srv02 Mass scanning activity detected Target: 873(rsync) ..
2020-09-28 22:58:50
86.23.89.251 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-09-28 23:05:07
49.88.112.114 attack
Sep 28 15:38:17 server sshd[31070]: Failed password for root from 49.88.112.114 port 11795 ssh2
Sep 28 15:38:20 server sshd[31070]: Failed password for root from 49.88.112.114 port 11795 ssh2
Sep 28 16:38:52 server sshd[44026]: Failed password for root from 49.88.112.114 port 25643 ssh2
2020-09-28 23:33:41
139.162.154.12 attack
18246/tcp 5900/tcp 5222/tcp...
[2020-08-03/09-27]12pkt,12pt.(tcp)
2020-09-28 23:15:19
109.238.49.70 attackspam
Time:     Sat Sep 26 14:50:54 2020 +0000
IP:       109.238.49.70 (DK/Denmark/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 26 14:42:48 activeserver sshd[24366]: Failed password for root from 109.238.49.70 port 56014 ssh2
Sep 26 14:48:48 activeserver sshd[2882]: Invalid user produccion from 109.238.49.70 port 49150
Sep 26 14:48:50 activeserver sshd[2882]: Failed password for invalid user produccion from 109.238.49.70 port 49150 ssh2
Sep 26 14:50:48 activeserver sshd[6785]: Invalid user jboss from 109.238.49.70 port 37448
Sep 26 14:50:50 activeserver sshd[6785]: Failed password for invalid user jboss from 109.238.49.70 port 37448 ssh2
2020-09-28 22:53:31
178.62.72.89 attackbotsspam
38082/tcp 8545/tcp 20332/tcp...
[2020-09-14/27]26pkt,11pt.(tcp)
2020-09-28 23:07:42

Recently Reported IPs

32.94.5.10 72.165.109.184 127.119.103.3 249.155.106.0
145.187.104.60 38.116.185.130 9.1.134.193 32.131.7.14
33.90.61.234 243.20.109.147 44.140.229.53 145.92.71.202
59.158.13.209 2.9.23.198 44.45.187.167 3.20.12.67
203.187.14.217 109.119.159.225 145.112.152.115 195.155.136.202