Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.105.149.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40377
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.105.149.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020900 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 00:34:38 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 1.149.105.136.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 136.105.149.1.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
46.160.226.221 attackspam
[portscan] Port scan
2019-08-31 10:19:12
106.244.232.198 attackspam
2019-08-30T17:25:48.895240wiz-ks3 sshd[21961]: Invalid user jobs from 106.244.232.198 port 57504
2019-08-30T17:25:48.897344wiz-ks3 sshd[21961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.244.232.198
2019-08-30T17:25:48.895240wiz-ks3 sshd[21961]: Invalid user jobs from 106.244.232.198 port 57504
2019-08-30T17:25:50.962056wiz-ks3 sshd[21961]: Failed password for invalid user jobs from 106.244.232.198 port 57504 ssh2
2019-08-30T17:32:03.064820wiz-ks3 sshd[21979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.244.232.198  user=root
2019-08-30T17:32:04.943108wiz-ks3 sshd[21979]: Failed password for root from 106.244.232.198 port 52371 ssh2
2019-08-30T17:38:52.421491wiz-ks3 sshd[21993]: Invalid user admin from 106.244.232.198 port 47471
2019-08-30T17:38:52.423677wiz-ks3 sshd[21993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.244.232.198
2019-08-30T17:38:52.421491wiz-ks3 ssh
2019-08-31 10:32:46
165.227.69.39 attackbots
2019-08-31T01:57:27.109505abusebot-7.cloudsearch.cf sshd\[1211\]: Invalid user oracle from 165.227.69.39 port 32997
2019-08-31 10:00:34
23.129.64.100 attackbotsspam
2019-08-12T15:33:35.640135wiz-ks3 sshd[30301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=100.emeraldonion.org  user=root
2019-08-12T15:33:37.840930wiz-ks3 sshd[30301]: Failed password for root from 23.129.64.100 port 42797 ssh2
2019-08-12T15:33:40.387593wiz-ks3 sshd[30301]: Failed password for root from 23.129.64.100 port 42797 ssh2
2019-08-12T15:33:35.640135wiz-ks3 sshd[30301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=100.emeraldonion.org  user=root
2019-08-12T15:33:37.840930wiz-ks3 sshd[30301]: Failed password for root from 23.129.64.100 port 42797 ssh2
2019-08-12T15:33:40.387593wiz-ks3 sshd[30301]: Failed password for root from 23.129.64.100 port 42797 ssh2
2019-08-12T15:33:35.640135wiz-ks3 sshd[30301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=100.emeraldonion.org  user=root
2019-08-12T15:33:37.840930wiz-ks3 sshd[30301]: Failed password for root from 23.129.64.100 port
2019-08-31 10:10:08
167.114.210.86 attackbotsspam
Aug 31 04:05:49 dedicated sshd[12992]: Invalid user katie from 167.114.210.86 port 50674
2019-08-31 10:07:49
121.254.26.153 attackspam
Aug 31 03:50:30 mail sshd\[9090\]: Invalid user edward from 121.254.26.153 port 33208
Aug 31 03:50:30 mail sshd\[9090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.254.26.153
Aug 31 03:50:32 mail sshd\[9090\]: Failed password for invalid user edward from 121.254.26.153 port 33208 ssh2
Aug 31 03:55:16 mail sshd\[9595\]: Invalid user rezvie from 121.254.26.153 port 50230
Aug 31 03:55:16 mail sshd\[9595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.254.26.153
2019-08-31 10:02:33
111.6.76.80 attackspam
2019-08-10T15:14:05.823779wiz-ks3 sshd[6153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.6.76.80  user=root
2019-08-10T15:14:07.639668wiz-ks3 sshd[6153]: Failed password for root from 111.6.76.80 port 54793 ssh2
2019-08-10T15:14:10.073376wiz-ks3 sshd[6153]: Failed password for root from 111.6.76.80 port 54793 ssh2
2019-08-10T15:14:05.823779wiz-ks3 sshd[6153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.6.76.80  user=root
2019-08-10T15:14:07.639668wiz-ks3 sshd[6153]: Failed password for root from 111.6.76.80 port 54793 ssh2
2019-08-10T15:14:10.073376wiz-ks3 sshd[6153]: Failed password for root from 111.6.76.80 port 54793 ssh2
2019-08-10T15:14:05.823779wiz-ks3 sshd[6153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.6.76.80  user=root
2019-08-10T15:14:07.639668wiz-ks3 sshd[6153]: Failed password for root from 111.6.76.80 port 54793 ssh2
2019-08-10T15:14:10.073376wiz-ks3
2019-08-31 09:57:45
41.223.142.211 attackbotsspam
Aug 31 04:54:55 www sshd\[13733\]: Invalid user guest from 41.223.142.211Aug 31 04:54:57 www sshd\[13733\]: Failed password for invalid user guest from 41.223.142.211 port 59000 ssh2Aug 31 05:00:09 www sshd\[13783\]: Invalid user sirene from 41.223.142.211
...
2019-08-31 10:17:03
51.77.82.237 attackbots
2019-08-31T01:59:10.225740abusebot-7.cloudsearch.cf sshd\[1218\]: Invalid user nginx from 51.77.82.237 port 36370
2019-08-31 10:04:21
182.160.163.85 attackspam
Aug 31 04:20:16 lnxmail61 sshd[31101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.160.163.85
2019-08-31 10:28:41
162.243.136.230 attackspam
Aug 31 04:33:40 www sshd\[13490\]: Failed password for root from 162.243.136.230 port 35206 ssh2Aug 31 04:39:19 www sshd\[13560\]: Invalid user admin from 162.243.136.230Aug 31 04:39:21 www sshd\[13560\]: Failed password for invalid user admin from 162.243.136.230 port 50506 ssh2
...
2019-08-31 10:12:12
153.35.165.125 attack
Aug 31 04:55:30 www2 sshd\[60562\]: Invalid user mirror04 from 153.35.165.125Aug 31 04:55:32 www2 sshd\[60562\]: Failed password for invalid user mirror04 from 153.35.165.125 port 40485 ssh2Aug 31 04:59:31 www2 sshd\[60820\]: Invalid user kms from 153.35.165.125
...
2019-08-31 10:19:43
109.110.52.77 attackspam
2019-08-24T00:40:25.218117wiz-ks3 sshd[11128]: Invalid user jelena from 109.110.52.77 port 44830
2019-08-24T00:40:25.220195wiz-ks3 sshd[11128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.110.52.77
2019-08-24T00:40:25.218117wiz-ks3 sshd[11128]: Invalid user jelena from 109.110.52.77 port 44830
2019-08-24T00:40:27.029664wiz-ks3 sshd[11128]: Failed password for invalid user jelena from 109.110.52.77 port 44830 ssh2
2019-08-24T00:46:23.842501wiz-ks3 sshd[11161]: Invalid user mwang2 from 109.110.52.77 port 60130
2019-08-24T00:46:23.844640wiz-ks3 sshd[11161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.110.52.77
2019-08-24T00:46:23.842501wiz-ks3 sshd[11161]: Invalid user mwang2 from 109.110.52.77 port 60130
2019-08-24T00:46:25.468336wiz-ks3 sshd[11161]: Failed password for invalid user mwang2 from 109.110.52.77 port 60130 ssh2
2019-08-24T00:53:34.613739wiz-ks3 sshd[11209]: Invalid user scott from 109.110.52.77 port 4724
2019-08-31 10:08:57
210.245.8.23 attack
Aug 31 04:02:30 eventyay sshd[20664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.8.23
Aug 31 04:02:31 eventyay sshd[20664]: Failed password for invalid user psybnc from 210.245.8.23 port 39980 ssh2
Aug 31 04:09:20 eventyay sshd[22197]: Failed password for root from 210.245.8.23 port 56200 ssh2
...
2019-08-31 10:11:44
46.35.174.200 attackspam
Aug 31 02:23:48 hb sshd\[30291\]: Invalid user darkman from 46.35.174.200
Aug 31 02:23:48 hb sshd\[30291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.35.174.200
Aug 31 02:23:50 hb sshd\[30291\]: Failed password for invalid user darkman from 46.35.174.200 port 60090 ssh2
Aug 31 02:27:59 hb sshd\[30632\]: Invalid user norm from 46.35.174.200
Aug 31 02:27:59 hb sshd\[30632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.35.174.200
2019-08-31 10:31:41

Recently Reported IPs

3.71.79.57 67.225.239.230 197.91.15.37 236.30.15.119
164.107.99.37 56.106.72.105 166.77.243.82 40.43.162.6
43.225.121.7 186.235.98.239 118.86.141.205 78.59.44.216
26.246.216.36 152.153.29.241 183.218.114.87 135.190.0.35
138.248.147.102 187.19.51.82 207.59.116.254 152.196.120.143