Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.149.1.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55962
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.149.1.49.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031401 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 15 05:05:49 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 49.1.149.136.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 136.149.1.49.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
51.15.226.48 attackspambots
Jan 24 17:23:02 vserver sshd\[32185\]: Invalid user batman from 51.15.226.48Jan 24 17:23:03 vserver sshd\[32185\]: Failed password for invalid user batman from 51.15.226.48 port 37112 ssh2Jan 24 17:28:59 vserver sshd\[32273\]: Invalid user shelley from 51.15.226.48Jan 24 17:29:01 vserver sshd\[32273\]: Failed password for invalid user shelley from 51.15.226.48 port 53402 ssh2
...
2020-01-25 03:04:10
46.250.29.246 attackbotsspam
Unauthorized connection attempt detected from IP address 46.250.29.246 to port 23 [J]
2020-01-25 02:56:01
179.232.1.254 attack
Unauthorized connection attempt detected from IP address 179.232.1.254 to port 2220 [J]
2020-01-25 03:01:56
24.139.145.250 attackspambots
Unauthorized connection attempt detected from IP address 24.139.145.250 to port 2220 [J]
2020-01-25 03:05:32
212.83.146.233 attackspam
Unauthorized connection attempt detected from IP address 212.83.146.233 to port 8080 [J]
2020-01-25 02:58:35
98.143.227.144 attack
Invalid user ubuntu from 98.143.227.144 port 46408
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.143.227.144
Failed password for invalid user ubuntu from 98.143.227.144 port 46408 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.143.227.144  user=gnats
Failed password for gnats from 98.143.227.144 port 51406 ssh2
2020-01-25 03:13:48
103.70.46.159 attackspambots
Jan 24 13:32:23 MK-Soft-Root1 sshd[11695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.70.46.159 
Jan 24 13:32:26 MK-Soft-Root1 sshd[11695]: Failed password for invalid user daniel from 103.70.46.159 port 50582 ssh2
...
2020-01-25 03:10:57
188.166.1.95 attackspam
Jan 24 15:43:32 game-panel sshd[18558]: Failed password for root from 188.166.1.95 port 38303 ssh2
Jan 24 15:50:05 game-panel sshd[18816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.1.95
Jan 24 15:50:07 game-panel sshd[18816]: Failed password for invalid user mao from 188.166.1.95 port 47253 ssh2
2020-01-25 02:58:52
122.4.241.6 attackbotsspam
Unauthorized connection attempt detected from IP address 122.4.241.6 to port 2220 [J]
2020-01-25 03:24:47
49.233.150.36 attackspambots
Port scan detected on ports: 65529[TCP], 65529[TCP], 3389[TCP]
2020-01-25 02:55:31
74.82.47.13 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-25 03:10:33
5.89.64.166 attackbotsspam
Unauthorized connection attempt detected from IP address 5.89.64.166 to port 2220 [J]
2020-01-25 02:57:12
178.128.209.122 attackspambots
Jan 22 12:04:07 nbi-636 sshd[20924]: Invalid user tomcat from 178.128.209.122 port 36510
Jan 22 12:04:09 nbi-636 sshd[20924]: Failed password for invalid user tomcat from 178.128.209.122 port 36510 ssh2
Jan 22 12:04:09 nbi-636 sshd[20924]: Received disconnect from 178.128.209.122 port 36510:11: Bye Bye [preauth]
Jan 22 12:04:09 nbi-636 sshd[20924]: Disconnected from 178.128.209.122 port 36510 [preauth]
Jan 22 12:17:19 nbi-636 sshd[24988]: User r.r from 178.128.209.122 not allowed because not listed in AllowUsers
Jan 22 12:17:19 nbi-636 sshd[24988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.209.122  user=r.r
Jan 22 12:17:21 nbi-636 sshd[24988]: Failed password for invalid user r.r from 178.128.209.122 port 36558 ssh2
Jan 22 12:17:21 nbi-636 sshd[24988]: Received disconnect from 178.128.209.122 port 36558:11: Bye Bye [preauth]
Jan 22 12:17:21 nbi-636 sshd[24988]: Disconnected from 178.128.209.122 port 36558 [preauth]
J........
-------------------------------
2020-01-25 03:11:14
51.68.47.45 attack
Jan 24 19:08:50 odroid64 sshd\[17585\]: Invalid user api from 51.68.47.45
Jan 24 19:08:50 odroid64 sshd\[17585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.47.45
...
2020-01-25 03:03:45
89.248.174.146 attack
Port Scanning MultiHosts/TCP 81 & 5555
2020-01-25 03:22:37

Recently Reported IPs

155.100.134.125 44.135.94.251 8.16.41.178 154.224.140.197
2.94.31.193 90.253.109.202 133.37.113.144 228.230.17.238
242.124.149.208 43.69.56.248 7.7.43.208 121.116.124.195
101.211.60.59 108.36.85.18 104.49.138.9 37.79.81.28
38.81.230.123 153.228.78.84 33.171.187.111 103.14.128.70