Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.11.149.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3583
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.11.149.239.			IN	A

;; AUTHORITY SECTION:
.			409	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 16:27:43 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 239.149.11.120.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 239.149.11.120.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
68.183.134.90 attack
Automatic report - Banned IP Access
2019-07-26 11:38:38
185.176.27.114 attack
Bruteforce on SSH Honeypot
2019-07-26 12:42:18
85.37.40.186 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-25 22:41:45,478 INFO [amun_request_handler] PortScan Detected on Port: 445 (85.37.40.186)
2019-07-26 12:20:27
200.188.129.178 attackspam
2019-07-26T04:18:07.410045abusebot-2.cloudsearch.cf sshd\[13212\]: Invalid user rcesd from 200.188.129.178 port 43594
2019-07-26 12:33:19
170.130.187.54 attackspambots
firewall-block, port(s): 3389/tcp
2019-07-26 11:49:04
184.161.230.77 attackspambots
DATE:2019-07-26 01:03:04, IP:184.161.230.77, PORT:ssh brute force auth on SSH service (patata)
2019-07-26 12:42:58
91.204.14.204 attackbotsspam
7.082.916,34-04/03 [bc22/m88] concatform PostRequest-Spammer scoring: Lusaka01
2019-07-26 12:20:01
85.95.178.116 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-25 22:43:55,404 INFO [amun_request_handler] PortScan Detected on Port: 445 (85.95.178.116)
2019-07-26 11:46:21
179.178.208.88 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-25 22:42:54,051 INFO [amun_request_handler] PortScan Detected on Port: 445 (179.178.208.88)
2019-07-26 11:55:37
194.143.136.122 attackbots
Automatic report - Port Scan Attack
2019-07-26 12:34:52
91.206.15.246 attackbotsspam
26.07.2019 04:13:45 Connection to port 3240 blocked by firewall
2019-07-26 12:25:37
162.243.150.222 attack
Port scan: Attack repeated for 24 hours
2019-07-26 11:56:22
104.140.188.10 attackbotsspam
23/tcp 3306/tcp 3389/tcp...
[2019-06-07/07-24]30pkt,10pt.(tcp),2pt.(udp)
2019-07-26 11:42:09
142.93.39.29 attackspam
Jul 26 04:41:31 localhost sshd\[10625\]: Invalid user test from 142.93.39.29 port 41382
Jul 26 04:41:31 localhost sshd\[10625\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.39.29
Jul 26 04:41:32 localhost sshd\[10625\]: Failed password for invalid user test from 142.93.39.29 port 41382 ssh2
2019-07-26 11:44:30
111.29.27.97 attack
DATE:2019-07-26 01:03:48, IP:111.29.27.97, PORT:ssh brute force auth on SSH service (patata)
2019-07-26 11:55:05

Recently Reported IPs

120.11.149.203 120.11.149.24 56.227.161.41 120.11.149.31
120.11.149.42 120.11.149.58 120.11.150.134 120.11.150.138
120.11.150.141 120.11.150.153 120.11.150.161 120.11.150.175
120.11.150.185 120.11.150.194 120.11.150.196 120.11.150.202
120.11.150.215 120.11.150.227 118.127.44.163 120.11.150.37