Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 135.181.146.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9576
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;135.181.146.149.		IN	A

;; AUTHORITY SECTION:
.			218	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:44:22 CST 2022
;; MSG SIZE  rcvd: 108
Host info
149.146.181.135.in-addr.arpa domain name pointer server.kodenlogix.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.146.181.135.in-addr.arpa	name = server.kodenlogix.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.171 attackbotsspam
SSH Brute Force, server-1 sshd[5443]: Failed password for root from 218.92.0.171 port 33621 ssh2
2020-01-07 05:35:16
41.221.168.167 attack
Jan  6 21:54:00 [host] sshd[20003]: Invalid user nassima from 41.221.168.167
Jan  6 21:54:00 [host] sshd[20003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.221.168.167
Jan  6 21:54:02 [host] sshd[20003]: Failed password for invalid user nassima from 41.221.168.167 port 57816 ssh2
2020-01-07 05:05:48
176.31.191.61 attackspambots
Jan  6 21:53:41 [host] sshd[19986]: Invalid user rvk from 176.31.191.61
Jan  6 21:53:41 [host] sshd[19986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.191.61
Jan  6 21:53:42 [host] sshd[19986]: Failed password for invalid user rvk from 176.31.191.61 port 47102 ssh2
2020-01-07 05:15:32
125.124.38.96 attackbots
SSH Login Bruteforce
2020-01-07 05:16:54
180.250.162.9 attackbotsspam
Jan  6 21:50:28 root sshd[17543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.162.9 
Jan  6 21:50:30 root sshd[17543]: Failed password for invalid user administrator from 180.250.162.9 port 2304 ssh2
Jan  6 21:54:12 root sshd[17577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.162.9 
...
2020-01-07 04:56:49
114.116.98.221 attack
Unauthorized connection attempt detected from IP address 114.116.98.221 to port 22 [T]
2020-01-07 05:34:13
123.25.37.121 attackspam
1578344054 - 01/06/2020 21:54:14 Host: 123.25.37.121/123.25.37.121 Port: 445 TCP Blocked
2020-01-07 04:54:49
222.186.173.180 attack
Jan  6 21:56:44 * sshd[23232]: Failed password for root from 222.186.173.180 port 14264 ssh2
Jan  6 21:56:57 * sshd[23232]: error: maximum authentication attempts exceeded for root from 222.186.173.180 port 14264 ssh2 [preauth]
2020-01-07 05:06:18
80.82.64.214 attack
Jan  6 21:53:33 nginx sshd[21937]: Connection from 80.82.64.214 port 59579 on 10.23.102.80 port 22
Jan  6 21:53:40 nginx sshd[21937]: Connection closed by 80.82.64.214 port 59579 [preauth]
2020-01-07 05:15:10
198.98.52.141 attackspambots
(sshd) Failed SSH login from 198.98.52.141 (US/United States/EAST.CDN.EXILESERVERS.COM): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jan  6 21:59:15 blur sshd[27268]: Invalid user postgres from 198.98.52.141 port 40318
Jan  6 21:59:15 blur sshd[27264]: Invalid user tester from 198.98.52.141 port 40306
Jan  6 21:59:15 blur sshd[27270]: Invalid user vagrant from 198.98.52.141 port 40316
Jan  6 21:59:15 blur sshd[27267]: Invalid user vsftp from 198.98.52.141 port 40328
Jan  6 21:59:15 blur sshd[27273]: Invalid user test from 198.98.52.141 port 40326
2020-01-07 05:04:54
84.54.187.161 attack
2020-01-06T21:04:54.673183shield sshd\[20886\]: Invalid user hadoop from 84.54.187.161 port 55039
2020-01-06T21:04:54.677200shield sshd\[20886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vlan-187-static-161.comnet.bg
2020-01-06T21:04:56.665459shield sshd\[20886\]: Failed password for invalid user hadoop from 84.54.187.161 port 55039 ssh2
2020-01-06T21:07:40.384979shield sshd\[22964\]: Invalid user ir from 84.54.187.161 port 40343
2020-01-06T21:07:40.389133shield sshd\[22964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vlan-187-static-161.comnet.bg
2020-01-07 05:21:40
106.13.226.162 attack
Jan  6 20:54:16 work-partkepr sshd\[17740\]: Invalid user oh from 106.13.226.162 port 49694
Jan  6 20:54:16 work-partkepr sshd\[17740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.226.162
...
2020-01-07 04:56:18
222.186.180.223 attackspambots
2020-01-06T21:20:43.285926hub.schaetter.us sshd\[7798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223  user=root
2020-01-06T21:20:45.543343hub.schaetter.us sshd\[7798\]: Failed password for root from 222.186.180.223 port 13086 ssh2
2020-01-06T21:20:48.403524hub.schaetter.us sshd\[7798\]: Failed password for root from 222.186.180.223 port 13086 ssh2
2020-01-06T21:20:51.673257hub.schaetter.us sshd\[7798\]: Failed password for root from 222.186.180.223 port 13086 ssh2
2020-01-06T21:20:54.686791hub.schaetter.us sshd\[7798\]: Failed password for root from 222.186.180.223 port 13086 ssh2
...
2020-01-07 05:36:11
222.186.175.161 attackspam
Jan  6 22:23:14 jane sshd[24722]: Failed password for root from 222.186.175.161 port 58616 ssh2
Jan  6 22:23:18 jane sshd[24722]: Failed password for root from 222.186.175.161 port 58616 ssh2
...
2020-01-07 05:26:30
45.184.225.2 attackbotsspam
Jan  6 22:16:51 meumeu sshd[6623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.184.225.2 
Jan  6 22:16:53 meumeu sshd[6623]: Failed password for invalid user admin from 45.184.225.2 port 44913 ssh2
Jan  6 22:18:40 meumeu sshd[6836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.184.225.2 
...
2020-01-07 05:25:50

Recently Reported IPs

135.181.154.49 135.181.162.70 135.181.163.109 135.181.164.107
135.181.164.29 135.181.164.131 135.181.164.213 135.181.165.217
135.181.165.42 135.181.166.46 135.181.172.181 135.181.170.35
135.181.176.137 135.181.177.46 135.181.170.67 135.181.18.5
135.181.180.133 135.181.181.70 135.181.183.142 135.181.183.202