Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
136.243.37.219 attack
20 attempts against mh-misbehave-ban on flare
2020-06-20 08:36:27
136.243.37.219 attack
20 attempts against mh-misbehave-ban on ice
2020-06-02 17:42:24
136.243.37.219 attackspam
20 attempts against mh-misbehave-ban on ice
2020-05-25 12:20:28
136.243.32.188 attackspambots
Mar  4 07:08:29 vps647732 sshd[5160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.243.32.188
Mar  4 07:08:31 vps647732 sshd[5160]: Failed password for invalid user xulei from 136.243.32.188 port 53870 ssh2
...
2020-03-04 14:40:32
136.243.37.219 attack
20 attempts against mh-misbehave-ban on pluto
2020-02-06 18:58:08
136.243.37.61 attack
C1,WP GET /suche/wp-login.php
2019-08-07 08:11:41
136.243.37.61 attackbotsspam
136.243.37.61 - - \[04/Aug/2019:14:42:37 +0200\] "POST /wp-login.php HTTP/1.1" 200 2110 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
136.243.37.61 - - \[04/Aug/2019:14:42:37 +0200\] "POST /wp-login.php HTTP/1.1" 200 2113 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-08-04 22:34:44
136.243.37.219 attackbotsspam
20 attempts against mh-misbehave-ban on pluto.magehost.pro
2019-07-27 08:49:47
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.243.3.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47923
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.243.3.149.			IN	A

;; AUTHORITY SECTION:
.			561	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021500 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 15 18:57:24 CST 2022
;; MSG SIZE  rcvd: 106
Host info
149.3.243.136.in-addr.arpa domain name pointer static.149.3.243.136.clients.your-server.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.3.243.136.in-addr.arpa	name = static.149.3.243.136.clients.your-server.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
209.97.153.35 attackbotsspam
Sep  2 06:57:29 taivassalofi sshd[72522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.153.35
Sep  2 06:57:31 taivassalofi sshd[72522]: Failed password for invalid user ahvaugha from 209.97.153.35 port 60246 ssh2
...
2019-09-02 12:59:22
74.82.47.31 attack
" "
2019-09-02 12:26:22
139.59.41.6 attackbots
Sep  2 07:00:35 www1 sshd\[13243\]: Invalid user fabrice from 139.59.41.6Sep  2 07:00:37 www1 sshd\[13243\]: Failed password for invalid user fabrice from 139.59.41.6 port 35880 ssh2Sep  2 07:05:12 www1 sshd\[14618\]: Invalid user training from 139.59.41.6Sep  2 07:05:14 www1 sshd\[14618\]: Failed password for invalid user training from 139.59.41.6 port 51958 ssh2Sep  2 07:09:51 www1 sshd\[15822\]: Invalid user htt from 139.59.41.6Sep  2 07:09:53 www1 sshd\[15822\]: Failed password for invalid user htt from 139.59.41.6 port 39802 ssh2
...
2019-09-02 12:21:00
206.189.134.83 attack
DATE:2019-09-02 05:15:09, IP:206.189.134.83, PORT:ssh SSH brute force auth on honeypot server (honey-neo-dc-bis)
2019-09-02 12:42:24
123.15.88.59 attackspambots
Sep  1 14:55:37 localhost kernel: [1101953.163835] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=123.15.88.59 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=44232 PROTO=TCP SPT=24481 DPT=52869 WINDOW=8657 RES=0x00 SYN URGP=0 
Sep  1 14:55:37 localhost kernel: [1101953.163873] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=123.15.88.59 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=44232 PROTO=TCP SPT=24481 DPT=52869 SEQ=758669438 ACK=0 WINDOW=8657 RES=0x00 SYN URGP=0 
Sep  1 23:22:57 localhost kernel: [1132393.649843] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=123.15.88.59 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=64671 PROTO=TCP SPT=24481 DPT=52869 WINDOW=8657 RES=0x00 SYN URGP=0 
Sep  1 23:22:57 localhost kernel: [1132393.649865] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=123.15.88.59 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00
2019-09-02 12:22:02
200.196.253.251 attack
Sep  1 18:15:45 friendsofhawaii sshd\[10285\]: Invalid user admin from 200.196.253.251
Sep  1 18:15:45 friendsofhawaii sshd\[10285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.196.253.251
Sep  1 18:15:48 friendsofhawaii sshd\[10285\]: Failed password for invalid user admin from 200.196.253.251 port 48924 ssh2
Sep  1 18:20:46 friendsofhawaii sshd\[10685\]: Invalid user tamara from 200.196.253.251
Sep  1 18:20:46 friendsofhawaii sshd\[10685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.196.253.251
2019-09-02 12:30:19
165.227.41.202 attack
Sep  2 06:29:11 [host] sshd[25741]: Invalid user pico from 165.227.41.202
Sep  2 06:29:11 [host] sshd[25741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.41.202
Sep  2 06:29:13 [host] sshd[25741]: Failed password for invalid user pico from 165.227.41.202 port 51820 ssh2
2019-09-02 12:30:37
195.154.59.4 attackbotsspam
Sep  1 17:17:05 php1 sshd\[1594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.59.4  user=root
Sep  1 17:17:07 php1 sshd\[1594\]: Failed password for root from 195.154.59.4 port 60730 ssh2
Sep  1 17:22:46 php1 sshd\[2154\]: Invalid user enzo from 195.154.59.4
Sep  1 17:22:46 php1 sshd\[2154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.59.4
Sep  1 17:22:48 php1 sshd\[2154\]: Failed password for invalid user enzo from 195.154.59.4 port 47840 ssh2
2019-09-02 12:29:48
60.167.20.252 attackbotsspam
Sep  2 05:14:10 mxgate1 postfix/postscreen[29970]: CONNECT from [60.167.20.252]:64657 to [176.31.12.44]:25
Sep  2 05:14:10 mxgate1 postfix/dnsblog[29971]: addr 60.167.20.252 listed by domain zen.spamhaus.org as 127.0.0.11
Sep  2 05:14:10 mxgate1 postfix/dnsblog[29971]: addr 60.167.20.252 listed by domain zen.spamhaus.org as 127.0.0.4
Sep  2 05:14:10 mxgate1 postfix/dnsblog[29983]: addr 60.167.20.252 listed by domain cbl.abuseat.org as 127.0.0.2
Sep  2 05:14:10 mxgate1 postfix/dnsblog[29974]: addr 60.167.20.252 listed by domain b.barracudacentral.org as 127.0.0.2
Sep  2 05:14:16 mxgate1 postfix/postscreen[29970]: DNSBL rank 4 for [60.167.20.252]:64657
Sep x@x
Sep  2 05:14:17 mxgate1 postfix/postscreen[29970]: DISCONNECT [60.167.20.252]:64657


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=60.167.20.252
2019-09-02 12:28:57
62.102.148.69 attack
Sep  2 03:22:49 sshgateway sshd\[12680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.102.148.69  user=root
Sep  2 03:22:52 sshgateway sshd\[12680\]: Failed password for root from 62.102.148.69 port 39595 ssh2
Sep  2 03:23:02 sshgateway sshd\[12680\]: Failed password for root from 62.102.148.69 port 39595 ssh2
2019-09-02 12:18:25
112.85.42.232 attack
Sep  2 05:56:14 debian sshd\[2060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232  user=root
Sep  2 05:56:16 debian sshd\[2060\]: Failed password for root from 112.85.42.232 port 28037 ssh2
...
2019-09-02 13:07:51
186.201.214.164 attackbotsspam
Sep  2 06:23:38 MK-Soft-Root1 sshd\[14746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.201.214.164  user=root
Sep  2 06:23:40 MK-Soft-Root1 sshd\[14746\]: Failed password for root from 186.201.214.164 port 19042 ssh2
Sep  2 06:28:45 MK-Soft-Root1 sshd\[15649\]: Invalid user xxx from 186.201.214.164 port 39265
Sep  2 06:28:45 MK-Soft-Root1 sshd\[15649\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.201.214.164
...
2019-09-02 12:56:36
202.62.41.68 attack
DATE:2019-09-02 05:22:18, IP:202.62.41.68, PORT:1433 - MSSQL brute force auth on a honeypot server (epe-dc)
2019-09-02 13:09:22
83.19.158.250 attack
Sep  1 18:35:56 eddieflores sshd\[23657\]: Invalid user hs from 83.19.158.250
Sep  1 18:35:56 eddieflores sshd\[23657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cxy250.internetdsl.tpnet.pl
Sep  1 18:35:58 eddieflores sshd\[23657\]: Failed password for invalid user hs from 83.19.158.250 port 53872 ssh2
Sep  1 18:40:56 eddieflores sshd\[24178\]: Invalid user v from 83.19.158.250
Sep  1 18:40:56 eddieflores sshd\[24178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cxy250.internetdsl.tpnet.pl
2019-09-02 12:51:08
89.216.47.154 attack
Sep  1 18:19:30 sachi sshd\[4009\]: Invalid user test from 89.216.47.154
Sep  1 18:19:30 sachi sshd\[4009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.216.47.154
Sep  1 18:19:31 sachi sshd\[4009\]: Failed password for invalid user test from 89.216.47.154 port 58007 ssh2
Sep  1 18:23:30 sachi sshd\[4345\]: Invalid user nacho from 89.216.47.154
Sep  1 18:23:30 sachi sshd\[4345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.216.47.154
2019-09-02 12:26:03

Recently Reported IPs

101.78.231.111 217.48.185.145 36.248.70.226 105.83.151.187
149.210.20.168 66.149.9.49 76.164.139.158 57.143.128.200
2.16.194.149 243.249.36.172 69.241.60.137 234.114.161.140
251.52.167.111 54.39.24.244 198.132.118.86 232.204.146.246
136.219.117.197 195.41.49.98 5.26.127.115 239.162.15.41