Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: St. Louis

Region: Missouri

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       144.126.128.0 - 144.126.159.255
CIDR:           144.126.128.0/19
NetName:        CONTA-48
NetHandle:      NET-144-126-128-0-1
Parent:         NET144 (NET-144-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Contabo Inc. (CONTA-48)
RegDate:        2021-03-16
Updated:        2023-05-16
Ref:            https://rdap.arin.net/registry/ip/144.126.128.0


OrgName:        Contabo Inc.
OrgId:          CONTA-48
Address:        710 N Tucker Blvd. STE 400A
City:           St. Louis
StateProv:      MO
PostalCode:     63101
Country:        US
RegDate:        2019-12-23
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/CONTA-48


OrgNOCHandle: CONTA393-ARIN
OrgNOCName:   Contabo NOC
OrgNOCPhone:  +498921665862 
OrgNOCEmail:  sascha.wintz@contabo.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/CONTA393-ARIN

OrgAbuseHandle: CAD61-ARIN
OrgAbuseName:   Contabo Abuse Department
OrgAbusePhone:  +498921268372 
OrgAbuseEmail:  abuse@contabo.de
OrgAbuseRef:    https://rdap.arin.net/registry/entity/CAD61-ARIN

OrgTechHandle: CONTA392-ARIN
OrgTechName:   Contabo Tech
OrgTechPhone:  +498921268372 
OrgTechEmail:  wilhelm.zwalina@contabo.de
OrgTechRef:    https://rdap.arin.net/registry/entity/CONTA392-ARIN

OrgRoutingHandle: CONTA393-ARIN
OrgRoutingName:   Contabo NOC
OrgRoutingPhone:  +498921665862 
OrgRoutingEmail:  sascha.wintz@contabo.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/CONTA393-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.126.132.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60670
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;144.126.132.98.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042500 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 25 18:31:55 CST 2026
;; MSG SIZE  rcvd: 107
Host info
98.132.126.144.in-addr.arpa domain name pointer vmi3231749.contaboserver.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
98.132.126.144.in-addr.arpa	name = vmi3231749.contaboserver.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.229.79.17 attackspambots
Feb 25 15:03:08 mockhub sshd[26331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.79.17
Feb 25 15:03:10 mockhub sshd[26331]: Failed password for invalid user sandeep from 111.229.79.17 port 53830 ssh2
...
2020-02-26 07:03:49
143.0.178.142 attack
2020-02-25 16:04:07 H=(1-backlink.com) [143.0.178.142]:35642 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/query/ip/143.0.178.142)
2020-02-25 16:04:07 H=(1-backlink.com) [143.0.178.142]:35642 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/query/ip/143.0.178.142)
2020-02-25 16:04:07 H=(1-backlink.com) [143.0.178.142]:35642 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/query/ip/143.0.178.142)
2020-02-25 16:04:07 H=(1-backlink.com) [143.0.178.142]:35642 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xa
...
2020-02-26 06:57:13
146.66.178.78 attackbots
[portscan] Port scan
2020-02-26 07:13:28
211.24.100.215 attackspambots
Honeypot attack, port: 445, PTR: cgw-211-24-100-215.bbrtl.time.net.my.
2020-02-26 06:53:15
140.136.170.12 attackspambots
Honeypot attack, port: 81, PTR: user12.ext.fju.edu.tw.
2020-02-26 06:59:30
71.200.234.56 attackbots
Honeypot attack, port: 5555, PTR: c-71-200-234-56.hsd1.fl.comcast.net.
2020-02-26 06:59:06
200.225.222.161 attackspam
Honeypot attack, port: 445, PTR: 200-225-222-161.static.ctbctelecom.com.br.
2020-02-26 07:05:47
103.52.216.52 attackbots
suspicious action Tue, 25 Feb 2020 13:32:52 -0300
2020-02-26 07:14:30
134.19.177.53 attackspam
Brute forcing email accounts
2020-02-26 06:42:01
190.181.15.197 attack
Feb 25 19:33:33 server sshd\[23143\]: Invalid user admin from 190.181.15.197
Feb 25 19:33:33 server sshd\[23143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.181.15.197 
Feb 25 19:33:35 server sshd\[23143\]: Failed password for invalid user admin from 190.181.15.197 port 52968 ssh2
Feb 25 19:33:42 server sshd\[23197\]: Invalid user admin from 190.181.15.197
Feb 25 19:33:42 server sshd\[23197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.181.15.197 
...
2020-02-26 06:42:52
219.78.59.2 attackbots
Honeypot attack, port: 5555, PTR: n219078059002.netvigator.com.
2020-02-26 06:51:16
185.118.76.134 attackbots
Port probing on unauthorized port 5555
2020-02-26 06:42:19
51.75.105.227 attackbots
Date: Tue, 25 Feb 2020 00:07:50 -0000
From: "Lifeventure" 
Subject: Things From The Past That Look Practically Unrecognizable Today
Reply-To: " Lifeventure "  
 lifeventureclubnews.com  resolves to   188.116.57.30
2020-02-26 06:40:30
103.145.172.10 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-26 06:39:57
107.193.106.251 attackbotsspam
Feb 25 22:00:31 MK-Soft-VM8 sshd[18105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.193.106.251 
Feb 25 22:00:32 MK-Soft-VM8 sshd[18105]: Failed password for invalid user admin from 107.193.106.251 port 52742 ssh2
...
2020-02-26 06:54:06

Recently Reported IPs

2606:4700:10::6816:1424 172.191.178.243 185.236.25.175 121.40.196.207
112.111.200.61 91.196.152.67 2606:4700:10::6814:6096 2606:4700:10::6814:4628
104.243.35.45 68.183.216.224 68.183.223.205 91.196.152.156
20.65.194.105 161.35.70.8 27.115.124.159 162.63.216.193
26.134.42.148 72.255.32.50 45.142.154.103 192.175.111.232