Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: Primus Telecommunications

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.149.0.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57456
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;122.149.0.68.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Sep 03 01:13:39 CST 2019
;; MSG SIZE  rcvd: 116
Host info
68.0.149.122.in-addr.arpa domain name pointer 68.0.149.122.sta.dodo.net.au.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
68.0.149.122.in-addr.arpa	name = 68.0.149.122.sta.dodo.net.au.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.242.116.72 attack
Dec 18 08:30:16 grey postfix/smtpd\[19409\]: NOQUEUE: reject: RCPT from snow.pahlupi.com\[103.242.116.72\]: 554 5.7.1 Service unavailable\; Client host \[103.242.116.72\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[103.242.116.72\]\; from=\ to=\ proto=ESMTP helo=\
...
2019-12-18 21:10:52
218.92.0.184 attack
Dec 18 13:29:57 jane sshd[5396]: Failed password for root from 218.92.0.184 port 65474 ssh2
Dec 18 13:30:02 jane sshd[5396]: Failed password for root from 218.92.0.184 port 65474 ssh2
...
2019-12-18 21:02:00
185.215.55.107 attackbotsspam
Unauthorized connection attempt detected from IP address 185.215.55.107 to port 445
2019-12-18 21:39:27
141.98.80.124 attackbots
Dec 18 12:16:10 mail postfix/smtpd[316]: warning: unknown[141.98.80.124]: SASL PLAIN authentication failed: 
Dec 18 12:16:11 mail postfix/smtpd[317]: warning: unknown[141.98.80.124]: SASL PLAIN authentication failed: 
Dec 18 12:16:11 mail postfix/smtpd[1389]: warning: unknown[141.98.80.124]: SASL PLAIN authentication failed: 
Dec 18 12:16:11 mail postfix/smtpd[27335]: warning: unknown[141.98.80.124]: SASL PLAIN authentication failed: 
Dec 18 12:16:11 mail postfix/smtpd[27667]: warning: unknown[141.98.80.124]: SASL PLAIN authentication failed: 
Dec 18 12:16:11 mail postfix/smtpd[322]: warning: unknown[141.98.80.124]: SASL PLAIN authentication failed:
2019-12-18 21:32:41
37.187.16.30 attackspambots
$f2bV_matches
2019-12-18 21:36:00
182.61.39.131 attackspam
Dec 18 02:32:44 php1 sshd\[30776\]: Invalid user dods from 182.61.39.131
Dec 18 02:32:44 php1 sshd\[30776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.39.131
Dec 18 02:32:46 php1 sshd\[30776\]: Failed password for invalid user dods from 182.61.39.131 port 49992 ssh2
Dec 18 02:38:00 php1 sshd\[31406\]: Invalid user admin from 182.61.39.131
Dec 18 02:38:00 php1 sshd\[31406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.39.131
2019-12-18 21:09:36
122.152.210.200 attackbots
Dec 18 04:42:20 firewall sshd[15382]: Invalid user susick from 122.152.210.200
Dec 18 04:42:22 firewall sshd[15382]: Failed password for invalid user susick from 122.152.210.200 port 58570 ssh2
Dec 18 04:50:10 firewall sshd[15582]: Invalid user gdm from 122.152.210.200
...
2019-12-18 21:13:12
202.62.8.21 attack
Unauthorized connection attempt detected from IP address 202.62.8.21 to port 445
2019-12-18 21:38:43
106.13.44.83 attack
Dec  9 05:06:19 vtv3 sshd[16108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.44.83 
Dec  9 05:06:21 vtv3 sshd[16108]: Failed password for invalid user aurora from 106.13.44.83 port 37186 ssh2
Dec  9 05:18:19 vtv3 sshd[22064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.44.83 
Dec  9 05:18:20 vtv3 sshd[22064]: Failed password for invalid user chadha from 106.13.44.83 port 39876 ssh2
Dec  9 05:24:18 vtv3 sshd[24799]: Failed password for root from 106.13.44.83 port 41222 ssh2
Dec  9 05:36:19 vtv3 sshd[30955]: Failed password for root from 106.13.44.83 port 43942 ssh2
Dec  9 05:42:05 vtv3 sshd[1442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.44.83 
Dec  9 05:42:07 vtv3 sshd[1442]: Failed password for invalid user orakel from 106.13.44.83 port 45290 ssh2
Dec  9 05:54:08 vtv3 sshd[6917]: Failed password for root from 106.13.44.83 port 47962 ssh2
Dec  9 05:59:56
2019-12-18 21:33:48
77.247.110.166 attackspambots
\[2019-12-18 08:17:36\] NOTICE\[2839\] chan_sip.c: Registration from '"star" \' failed for '77.247.110.166:6366' - Wrong password
\[2019-12-18 08:17:36\] NOTICE\[2839\] chan_sip.c: Registration from '"star" \' failed for '77.247.110.166:6366' - Wrong password
\[2019-12-18 08:17:36\] NOTICE\[2839\] chan_sip.c: Registration from '"star" \' failed for '77.247.110.166:6366' - Wrong password
\[2019-12-18 08:17:36\] NOTICE\[2839\] chan_sip.c: Registration from '"star" \' failed for '77.247.110.166:6366' - Wrong password
\[2019-12-18 08:17:36\] NOTICE\[2839\] chan_sip.c: Registration from '"star" \' failed for '77.247.110.166:6366' - Wrong password
\[2019-12-18 08:17:36\] NOTICE\[2839\] chan_sip.c: Registration from '"star" \' failed for '77.247.110.166:6366' - Wrong password
\[2019-12-18 08:17:36\] NOTICE\[2839\] c
2019-12-18 21:23:23
51.38.225.124 attackbots
Dec 18 02:56:09 hanapaa sshd\[12017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.225.124  user=mysql
Dec 18 02:56:11 hanapaa sshd\[12017\]: Failed password for mysql from 51.38.225.124 port 47026 ssh2
Dec 18 03:02:57 hanapaa sshd\[12648\]: Invalid user federal from 51.38.225.124
Dec 18 03:02:57 hanapaa sshd\[12648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.225.124
Dec 18 03:02:59 hanapaa sshd\[12648\]: Failed password for invalid user federal from 51.38.225.124 port 53076 ssh2
2019-12-18 21:06:54
165.22.114.58 attack
Dec 18 12:01:43 sauna sshd[24730]: Failed password for news from 165.22.114.58 port 52252 ssh2
Dec 18 12:07:04 sauna sshd[24838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.114.58
...
2019-12-18 21:24:55
121.159.227.159 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-18 21:05:13
49.234.201.90 attackspambots
Nov 21 21:13:07 microserver sshd[15807]: Invalid user ntps from 49.234.201.90 port 50162
Nov 21 21:13:07 microserver sshd[15807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.201.90
Nov 21 21:13:10 microserver sshd[15807]: Failed password for invalid user ntps from 49.234.201.90 port 50162 ssh2
Nov 21 21:21:33 microserver sshd[17031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.201.90  user=root
Nov 21 21:21:35 microserver sshd[17031]: Failed password for root from 49.234.201.90 port 36920 ssh2
Dec 18 09:57:55 microserver sshd[37691]: Invalid user misc from 49.234.201.90 port 60158
Dec 18 09:57:55 microserver sshd[37691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.201.90
Dec 18 09:57:57 microserver sshd[37691]: Failed password for invalid user misc from 49.234.201.90 port 60158 ssh2
Dec 18 10:05:04 microserver sshd[38700]: pam_unix(sshd:auth): authentication
2019-12-18 21:15:39
134.209.152.176 attack
ssh failed login
2019-12-18 21:06:33

Recently Reported IPs

176.99.141.5 206.188.23.141 221.83.17.86 59.40.183.154
45.43.44.79 99.194.216.150 165.89.88.228 187.77.67.56
59.40.183.152 121.98.100.226 95.128.172.227 36.81.7.195
103.115.46.119 106.51.162.9 59.40.183.145 121.200.155.41
128.119.164.128 8.169.91.100 50.233.152.202 181.133.6.58