Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.190.149.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15811
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.190.149.58.			IN	A

;; AUTHORITY SECTION:
.			393	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 18:19:33 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 58.149.190.119.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 58.149.190.119.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.167.145.24 attack
Unauthorized connection attempt from IP address 14.167.145.24 on Port 445(SMB)
2020-02-25 05:58:50
84.68.186.82 attackbotsspam
Automatic report - Port Scan Attack
2020-02-25 05:56:12
191.54.61.248 attackspam
Unauthorized connection attempt from IP address 191.54.61.248 on Port 445(SMB)
2020-02-25 06:04:01
27.72.73.25 attack
Unauthorized connection attempt from IP address 27.72.73.25 on Port 445(SMB)
2020-02-25 06:08:01
121.122.110.23 attackspambots
Automatic report - Port Scan Attack
2020-02-25 05:59:42
219.154.66.223 attackspambots
IMAP
2020-02-25 06:02:24
79.124.62.42 attackspambots
[portscan] Port scan
2020-02-25 05:48:11
185.234.219.85 attackspambots
IE_World Hosting Farm Limited_<177>1582563431 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 185.234.219.85:6000
2020-02-25 05:32:43
101.37.118.54 attack
Automatic report - Banned IP Access
2020-02-25 05:55:06
17.248.176.10 attackbotsspam
firewall-block, port(s): 53162/tcp
2020-02-25 06:02:11
5.63.151.104 attackspambots
4040/tcp 8761/tcp 12443/tcp...
[2019-12-27/2020-02-24]14pkt,11pt.(tcp),1pt.(udp)
2020-02-25 05:36:20
222.186.175.215 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Failed password for root from 222.186.175.215 port 27146 ssh2
Failed password for root from 222.186.175.215 port 27146 ssh2
Failed password for root from 222.186.175.215 port 27146 ssh2
Failed password for root from 222.186.175.215 port 27146 ssh2
2020-02-25 05:31:07
185.216.212.229 attackspambots
" "
2020-02-25 05:45:43
51.81.250.90 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-25 05:39:58
86.35.35.99 attack
Automatic report - Port Scan Attack
2020-02-25 05:43:40

Recently Reported IPs

119.190.149.247 119.190.149.7 119.190.15.34 119.190.149.73
119.190.150.121 119.190.150.101 119.190.150.239 119.190.150.181
119.190.150.162 119.190.150.3 115.53.66.124 119.190.150.48
119.190.150.94 119.190.151.125 119.190.151.101 119.190.151.140
119.190.151.154 119.190.151.173 119.190.151.209 119.190.151.211