Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.1.149.228
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29538
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.1.149.228.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020600 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 06 15:19:43 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 228.149.1.136.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 228.149.1.136.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.15.18 attackspam
Mar 13 20:26:01 localhost sshd[112689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.18  user=root
Mar 13 20:26:03 localhost sshd[112689]: Failed password for root from 222.186.15.18 port 34188 ssh2
Mar 13 20:26:05 localhost sshd[112689]: Failed password for root from 222.186.15.18 port 34188 ssh2
Mar 13 20:26:01 localhost sshd[112689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.18  user=root
Mar 13 20:26:03 localhost sshd[112689]: Failed password for root from 222.186.15.18 port 34188 ssh2
Mar 13 20:26:05 localhost sshd[112689]: Failed password for root from 222.186.15.18 port 34188 ssh2
Mar 13 20:26:01 localhost sshd[112689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.18  user=root
Mar 13 20:26:03 localhost sshd[112689]: Failed password for root from 222.186.15.18 port 34188 ssh2
Mar 13 20:26:05 localhost sshd[112689]: F
...
2020-03-14 04:26:31
217.182.68.93 attackbots
2020-03-13T16:53:16.024209vps751288.ovh.net sshd\[4111\]: Invalid user isa from 217.182.68.93 port 46738
2020-03-13T16:53:16.031907vps751288.ovh.net sshd\[4111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.ip-217-182-68.eu
2020-03-13T16:53:17.851960vps751288.ovh.net sshd\[4111\]: Failed password for invalid user isa from 217.182.68.93 port 46738 ssh2
2020-03-13T16:56:22.209802vps751288.ovh.net sshd\[4127\]: Invalid user alesiashavel from 217.182.68.93 port 57738
2020-03-13T16:56:22.220237vps751288.ovh.net sshd\[4127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.ip-217-182-68.eu
2020-03-14 04:30:35
49.235.139.216 attack
$f2bV_matches_ltvn
2020-03-14 04:34:24
81.91.136.3 attackspam
Mar 13 21:21:35 santamaria sshd\[10454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.91.136.3  user=mysql
Mar 13 21:21:37 santamaria sshd\[10454\]: Failed password for mysql from 81.91.136.3 port 37546 ssh2
Mar 13 21:25:50 santamaria sshd\[10497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.91.136.3  user=root
...
2020-03-14 04:29:48
14.228.20.108 attack
Feb 13 04:50:01 pi sshd[20143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.228.20.108 
Feb 13 04:50:04 pi sshd[20143]: Failed password for invalid user admin1 from 14.228.20.108 port 61959 ssh2
2020-03-14 04:54:38
221.181.197.226 attackspambots
Mar 13 13:40:05 santamaria sshd\[5327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.181.197.226  user=root
Mar 13 13:40:08 santamaria sshd\[5327\]: Failed password for root from 221.181.197.226 port 35970 ssh2
Mar 13 13:44:26 santamaria sshd\[5353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.181.197.226  user=root
...
2020-03-14 04:26:53
103.10.30.204 attack
2020-03-13T19:27:10.026576dmca.cloudsearch.cf sshd[10103]: Invalid user tmbcn from 103.10.30.204 port 33062
2020-03-13T19:27:10.032709dmca.cloudsearch.cf sshd[10103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.10.30.204
2020-03-13T19:27:10.026576dmca.cloudsearch.cf sshd[10103]: Invalid user tmbcn from 103.10.30.204 port 33062
2020-03-13T19:27:12.068050dmca.cloudsearch.cf sshd[10103]: Failed password for invalid user tmbcn from 103.10.30.204 port 33062 ssh2
2020-03-13T19:30:15.301982dmca.cloudsearch.cf sshd[10381]: Invalid user zhuht from 103.10.30.204 port 49760
2020-03-13T19:30:15.307601dmca.cloudsearch.cf sshd[10381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.10.30.204
2020-03-13T19:30:15.301982dmca.cloudsearch.cf sshd[10381]: Invalid user zhuht from 103.10.30.204 port 49760
2020-03-13T19:30:16.740583dmca.cloudsearch.cf sshd[10381]: Failed password for invalid user zhuht from 103.10.30.
...
2020-03-14 04:28:16
14.228.26.28 attackbots
Feb  8 05:53:18 pi sshd[27055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.228.26.28  user=root
Feb  8 05:53:19 pi sshd[27055]: Failed password for invalid user root from 14.228.26.28 port 62022 ssh2
2020-03-14 04:53:34
14.225.3.47 attackbotsspam
Jan 17 08:59:12 pi sshd[10817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.225.3.47 
Jan 17 08:59:14 pi sshd[10817]: Failed password for invalid user visitor from 14.225.3.47 port 43278 ssh2
2020-03-14 04:57:36
77.68.36.182 attackspambots
HTTP/80/443/8080 Probe, BF, WP, Hack -
2020-03-14 04:39:39
34.80.148.223 attack
Invalid user bananapi from 34.80.148.223 port 58966
2020-03-14 04:25:59
171.240.200.19 attack
Honeypot attack, port: 5555, PTR: dynamic-ip-adsl.viettel.vn.
2020-03-14 04:56:53
71.91.170.82 attack
Wordpress login
2020-03-14 04:40:06
14.29.214.3 attackspambots
Feb  3 01:01:35 pi sshd[31145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.214.3 
Feb  3 01:01:38 pi sshd[31145]: Failed password for invalid user libretto from 14.29.214.3 port 33507 ssh2
2020-03-14 04:24:08
49.235.87.213 attackbots
Mar 13 21:10:34 vserver sshd\[4827\]: Failed password for root from 49.235.87.213 port 38260 ssh2Mar 13 21:15:19 vserver sshd\[4852\]: Failed password for root from 49.235.87.213 port 36562 ssh2Mar 13 21:19:48 vserver sshd\[4870\]: Invalid user artif from 49.235.87.213Mar 13 21:19:50 vserver sshd\[4870\]: Failed password for invalid user artif from 49.235.87.213 port 34872 ssh2
...
2020-03-14 04:52:48

Recently Reported IPs

214.35.193.177 185.63.253.96 204.52.30.34 119.148.55.252
56.115.209.5 200.249.162.10 9.218.36.210 21.139.76.99
37.214.59.150 63.188.102.171 157.191.157.79 120.138.198.243
254.80.62.244 134.185.25.143 51.130.254.7 73.231.188.68
54.219.32.192 240.138.79.138 85.110.36.200 56.197.12.255