Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.97.100.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20715
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;122.97.100.149.			IN	A

;; AUTHORITY SECTION:
.			204	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020051900 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 20 01:11:05 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 149.100.97.122.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.100.97.122.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
31.172.192.194 attackbotsspam
SMB Server BruteForce Attack
2019-08-30 20:09:06
139.59.8.66 attackspambots
Invalid user harrison from 139.59.8.66 port 34904
2019-08-30 20:53:01
31.31.77.14 attack
Automatic report - Banned IP Access
2019-08-30 20:23:48
54.37.73.26 attack
Aug 30 13:36:22 vps647732 sshd[7413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.73.26
Aug 30 13:36:25 vps647732 sshd[7413]: Failed password for invalid user tester from 54.37.73.26 port 33867 ssh2
...
2019-08-30 20:07:27
104.248.195.226 attackbots
Invalid user gay from 104.248.195.226 port 36068
2019-08-30 20:10:24
177.234.181.254 attackspambots
firewall-block, port(s): 445/tcp
2019-08-30 20:16:07
104.42.30.9 attackspam
Invalid user admin from 104.42.30.9 port 23232
2019-08-30 20:07:04
178.128.21.38 attackspam
Aug 30 14:04:22 localhost sshd\[28604\]: Invalid user curelea from 178.128.21.38 port 55374
Aug 30 14:04:22 localhost sshd\[28604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.21.38
Aug 30 14:04:24 localhost sshd\[28604\]: Failed password for invalid user curelea from 178.128.21.38 port 55374 ssh2
2019-08-30 20:10:54
125.161.106.228 attackspambots
Unauthorized connection attempt from IP address 125.161.106.228 on Port 445(SMB)
2019-08-30 20:18:12
36.78.127.22 attackbotsspam
Unauthorized connection attempt from IP address 36.78.127.22 on Port 445(SMB)
2019-08-30 20:59:41
124.130.101.17 attackbotsspam
Unauthorised access (Aug 30) SRC=124.130.101.17 LEN=40 TTL=49 ID=30385 TCP DPT=23 WINDOW=27025 SYN
2019-08-30 20:23:21
61.84.138.57 attackspam
Telnet Server BruteForce Attack
2019-08-30 20:38:16
41.138.88.26 attackspam
445/tcp 445/tcp 445/tcp...
[2019-06-30/08-30]37pkt,1pt.(tcp)
2019-08-30 20:34:25
162.243.136.230 attackbots
T: f2b ssh aggressive 3x
2019-08-30 20:41:33
23.88.30.18 attack
SMB Server BruteForce Attack
2019-08-30 20:27:47

Recently Reported IPs

3.0.22.213 180.247.171.84 178.62.252.146 171.251.103.236
87.251.74.35 83.49.134.179 217.64.190.70 118.123.245.76
37.192.170.54 200.80.157.59 95.154.200.170 190.216.205.162
46.102.153.243 220.194.140.105 201.114.75.173 107.170.104.125
197.188.221.99 142.93.165.102 116.90.87.237 95.154.203.3