Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 135.64.3.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41227
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;135.64.3.149.			IN	A

;; AUTHORITY SECTION:
.			469	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022102100 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 22 00:36:26 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 149.3.64.135.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.3.64.135.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.233.92.166 attackbotsspam
$f2bV_matches
2020-01-10 04:47:37
189.7.17.61 attackbots
Unauthorized connection attempt detected from IP address 189.7.17.61 to port 22
2020-01-10 04:40:46
13.90.98.215 attackspambots
$f2bV_matches
2020-01-10 04:48:38
61.241.171.31 attackbotsspam
scan z
2020-01-10 04:58:45
115.79.83.90 attackspambots
Unauthorized connection attempt from IP address 115.79.83.90 on Port 445(SMB)
2020-01-10 05:00:33
106.112.90.197 attackspam
2020-01-09 07:00:40 dovecot_login authenticator failed for (obzxd) [106.112.90.197]:54326 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=lijing@lerctr.org)
2020-01-09 07:00:47 dovecot_login authenticator failed for (kysqm) [106.112.90.197]:54326 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=lijing@lerctr.org)
2020-01-09 07:00:59 dovecot_login authenticator failed for (zztnl) [106.112.90.197]:54326 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=lijing@lerctr.org)
...
2020-01-10 05:11:21
202.168.229.110 attackspambots
Unauthorized connection attempt from IP address 202.168.229.110 on Port 445(SMB)
2020-01-10 04:59:59
79.166.226.88 attack
Telnet/23 MH Probe, BF, Hack -
2020-01-10 05:13:55
115.75.252.57 attackspambots
Unauthorized connection attempt from IP address 115.75.252.57 on Port 445(SMB)
2020-01-10 04:53:21
213.32.20.107 attackbotsspam
xmlrpc attack
2020-01-10 05:03:04
45.167.65.250 attackspambots
Telnet/23 MH Probe, BF, Hack -
2020-01-10 04:51:39
158.69.22.197 attack
Jan  9 14:21:26 vps691689 sshd[3579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.22.197
Jan  9 14:21:28 vps691689 sshd[3579]: Failed password for invalid user VM_dev from 158.69.22.197 port 34398 ssh2
...
2020-01-10 05:01:24
101.51.201.99 attack
Unauthorized connection attempt from IP address 101.51.201.99 on Port 445(SMB)
2020-01-10 05:13:15
67.205.152.225 attack
Telnet/23 MH Probe, BF, Hack -
2020-01-10 05:00:53
106.75.141.202 attack
Jan  9 23:01:33 server sshd\[328\]: Invalid user dobus from 106.75.141.202
Jan  9 23:01:33 server sshd\[328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.202 
Jan  9 23:01:35 server sshd\[328\]: Failed password for invalid user dobus from 106.75.141.202 port 37836 ssh2
Jan  9 23:23:37 server sshd\[5416\]: Invalid user rzz from 106.75.141.202
Jan  9 23:23:37 server sshd\[5416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.202 
...
2020-01-10 05:07:51

Recently Reported IPs

210.166.120.29 38.96.11.181 48.54.192.12 1.193.35.144
193.254.246.158 45.2.229.24 21.185.175.53 234.105.62.220
185.82.167.147 23.226.141.70 16.214.249.237 169.233.164.162
177.218.203.85 123.222.102.167 11.189.12.110 176.20.38.226
13.72.14.21 47.35.220.101 117.6.253.165 50.188.178.145