Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.244.232.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46725
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.244.232.149.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 02:14:40 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 149.232.244.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.232.244.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
181.30.26.40 attack
2019-10-30 19:30:17,294 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 181.30.26.40
2019-10-30 19:51:45,769 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 181.30.26.40
2019-10-30 20:12:59,982 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 181.30.26.40
2019-10-30 20:30:01,504 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 181.30.26.40
2019-10-30 20:46:57,881 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 181.30.26.40
2019-10-30 19:30:17,294 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 181.30.26.40
2019-10-30 19:51:45,769 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 181.30.26.40
2019-10-30 20:12:59,982 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 181.30.26.40
2019-10-30 20:30:01,504 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 181.30.26.40
2019-10-30 20:46:57,881 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 181.30.26.40
2019-10-30 19:30:17,294 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 181.30.26.40
2019-10-30 19:51:45,769
2019-11-01 03:38:45
222.186.175.147 attack
Oct 31 20:34:45 root sshd[15927]: Failed password for root from 222.186.175.147 port 17730 ssh2
Oct 31 20:34:49 root sshd[15927]: Failed password for root from 222.186.175.147 port 17730 ssh2
Oct 31 20:34:54 root sshd[15927]: Failed password for root from 222.186.175.147 port 17730 ssh2
Oct 31 20:35:00 root sshd[15927]: Failed password for root from 222.186.175.147 port 17730 ssh2
...
2019-11-01 03:35:25
94.177.204.106 attackspambots
Invalid user jeronimo from 94.177.204.106 port 58542
2019-11-01 03:24:53
181.49.157.10 attackspam
Automatic report - SSH Brute-Force Attack
2019-11-01 03:37:01
178.128.226.2 attackspam
Automatic report - Banned IP Access
2019-11-01 03:44:29
103.81.85.21 attackspam
Automatic report - XMLRPC Attack
2019-11-01 03:34:40
211.152.47.90 attackbots
2019-10-31 10:01:13,028 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 211.152.47.90
2019-10-31 10:40:50,945 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 211.152.47.90
2019-10-31 10:45:10,055 fail2ban.actions        \[1890\]: NOTICE  \[ssh\] Ban 211.152.47.90
2019-10-31 11:17:13,316 fail2ban.actions        \[1894\]: NOTICE  \[ssh\] Ban 211.152.47.90
2019-10-31 11:32:10,798 fail2ban.actions        \[1894\]: NOTICE  \[ssh\] Ban 211.152.47.90
2019-10-31 10:01:13,028 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 211.152.47.90
2019-10-31 10:40:50,945 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 211.152.47.90
2019-10-31 10:45:10,055 fail2ban.actions        \[1890\]: NOTICE  \[ssh\] Ban 211.152.47.90
2019-10-31 11:17:13,316 fail2ban.actions        \[1894\]: NOTICE  \[ssh\] Ban 211.152.47.90
2019-10-31 11:32:10,798 fail2ban.actions        \[1894\]: NOTICE  \[ssh\] Ban 211.152.47.90
2019-10-31 10:01:13,028 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 211.152.47.90
2019-10-31 1
2019-11-01 03:26:17
117.185.62.146 attackbotsspam
2019-10-31T19:15:37.543431abusebot-2.cloudsearch.cf sshd\[5177\]: Invalid user azureuser from 117.185.62.146 port 44037
2019-11-01 03:25:34
148.70.136.94 attack
2019-10-30 21:37:24,934 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 148.70.136.94
2019-10-30 22:00:10,827 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 148.70.136.94
2019-10-30 22:18:17,490 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 148.70.136.94
2019-10-30 22:36:28,643 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 148.70.136.94
2019-10-30 22:55:03,080 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 148.70.136.94
2019-10-30 21:37:24,934 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 148.70.136.94
2019-10-30 22:00:10,827 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 148.70.136.94
2019-10-30 22:18:17,490 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 148.70.136.94
2019-10-30 22:36:28,643 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 148.70.136.94
2019-10-30 22:55:03,080 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 148.70.136.94
2019-10-30 21:37:24,934 fail2ban.actions        \[1865\]: NOTICE  \[ssh\] Ban 148.70.136.94
2019-10-30 2
2019-11-01 03:51:05
82.159.138.57 attack
Oct 31 03:46:33 auw2 sshd\[14856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.159.138.57.static.user.ono.com  user=root
Oct 31 03:46:34 auw2 sshd\[14856\]: Failed password for root from 82.159.138.57 port 61244 ssh2
Oct 31 03:50:48 auw2 sshd\[15222\]: Invalid user myshake from 82.159.138.57
Oct 31 03:50:48 auw2 sshd\[15222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.159.138.57.static.user.ono.com
Oct 31 03:50:50 auw2 sshd\[15222\]: Failed password for invalid user myshake from 82.159.138.57 port 40528 ssh2
2019-11-01 03:59:40
114.7.15.169 attackbots
PostgreSQL port 5432
2019-11-01 03:51:37
188.131.179.87 attackbotsspam
Automatic report - Banned IP Access
2019-11-01 03:33:52
188.35.138.138 attackspam
SPAM Delivery Attempt
2019-11-01 03:42:29
183.82.100.141 attack
Oct 31 19:46:39 herz-der-gamer sshd[27981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.100.141  user=root
Oct 31 19:46:41 herz-der-gamer sshd[27981]: Failed password for root from 183.82.100.141 port 51464 ssh2
Oct 31 20:01:29 herz-der-gamer sshd[28059]: Invalid user vivian from 183.82.100.141 port 59220
...
2019-11-01 03:34:28
45.124.86.65 attackbotsspam
Oct 31 14:01:50 vpn01 sshd[2728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.124.86.65
Oct 31 14:01:51 vpn01 sshd[2728]: Failed password for invalid user aaaaaa123 from 45.124.86.65 port 33334 ssh2
...
2019-11-01 03:46:58

Recently Reported IPs

136.227.223.129 116.65.251.23 35.125.207.230 23.87.253.63
139.91.187.0 208.42.74.215 132.102.10.83 142.196.7.151
87.144.14.7 170.218.202.138 54.210.75.40 4.178.77.147
67.161.228.105 156.214.26.228 37.154.170.20 185.127.90.196
98.74.150.237 254.226.167.97 68.247.208.134 79.136.227.244