Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.149.35.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55317
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.149.35.164.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 00:25:33 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 164.35.149.146.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 146.149.35.164.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
66.249.76.23 attack
MYH,DEF GET /news/wp-content/plugins/custom-background/uploadify/uploadify.php
2020-07-25 17:30:45
37.187.236.87 attackbots
Unauthorised access (Jul 25) SRC=37.187.236.87 LEN=52 PREC=0x20 TTL=116 ID=11547 DF TCP DPT=445 WINDOW=8192 SYN
2020-07-25 17:22:00
202.51.74.45 attackbots
Failed password for invalid user postgres from 202.51.74.45 port 52232 ssh2
2020-07-25 17:01:58
91.121.175.61 attack
Jul 25 11:21:46 abendstille sshd\[5095\]: Invalid user arina from 91.121.175.61
Jul 25 11:21:46 abendstille sshd\[5095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.175.61
Jul 25 11:21:48 abendstille sshd\[5095\]: Failed password for invalid user arina from 91.121.175.61 port 53502 ssh2
Jul 25 11:23:42 abendstille sshd\[6748\]: Invalid user stack from 91.121.175.61
Jul 25 11:23:42 abendstille sshd\[6748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.175.61
...
2020-07-25 17:33:42
103.68.32.35 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-07-25 16:57:55
176.197.5.34 attackbots
Jul 25 09:08:24 lnxweb61 sshd[12419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.197.5.34
2020-07-25 17:23:19
178.21.164.90 attackbotsspam
firewall-block, port(s): 28/tcp
2020-07-25 17:21:39
75.134.60.248 attackspambots
2020-07-25T06:26:10.125410abusebot-6.cloudsearch.cf sshd[26930]: Invalid user edward from 75.134.60.248 port 54066
2020-07-25T06:26:10.132016abusebot-6.cloudsearch.cf sshd[26930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=075-134-060-248.res.spectrum.com
2020-07-25T06:26:10.125410abusebot-6.cloudsearch.cf sshd[26930]: Invalid user edward from 75.134.60.248 port 54066
2020-07-25T06:26:11.279810abusebot-6.cloudsearch.cf sshd[26930]: Failed password for invalid user edward from 75.134.60.248 port 54066 ssh2
2020-07-25T06:31:07.091553abusebot-6.cloudsearch.cf sshd[27356]: Invalid user luky from 75.134.60.248 port 39182
2020-07-25T06:31:07.095990abusebot-6.cloudsearch.cf sshd[27356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=075-134-060-248.res.spectrum.com
2020-07-25T06:31:07.091553abusebot-6.cloudsearch.cf sshd[27356]: Invalid user luky from 75.134.60.248 port 39182
2020-07-25T06:31:09.683601abuseb
...
2020-07-25 17:06:48
106.12.201.95 attackbotsspam
2020-07-25T07:12:13.293897shield sshd\[18183\]: Invalid user zbc from 106.12.201.95 port 55103
2020-07-25T07:12:13.303624shield sshd\[18183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.201.95
2020-07-25T07:12:15.425991shield sshd\[18183\]: Failed password for invalid user zbc from 106.12.201.95 port 55103 ssh2
2020-07-25T07:14:49.984285shield sshd\[18539\]: Invalid user ample from 106.12.201.95 port 20294
2020-07-25T07:14:49.993488shield sshd\[18539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.201.95
2020-07-25 17:12:03
142.93.127.195 attack
<6 unauthorized SSH connections
2020-07-25 16:59:16
49.235.104.204 attack
Jul 25 08:16:44 OPSO sshd\[22287\]: Invalid user jmeter from 49.235.104.204 port 50180
Jul 25 08:16:44 OPSO sshd\[22287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.104.204
Jul 25 08:16:47 OPSO sshd\[22287\]: Failed password for invalid user jmeter from 49.235.104.204 port 50180 ssh2
Jul 25 08:21:08 OPSO sshd\[23259\]: Invalid user ctm from 49.235.104.204 port 45346
Jul 25 08:21:08 OPSO sshd\[23259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.104.204
2020-07-25 17:27:51
106.52.42.153 attack
 TCP (SYN) 106.52.42.153:44009 -> port 8342, len 44
2020-07-25 17:27:22
118.201.65.165 attackbots
Jul 25 11:05:25 * sshd[24413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.201.65.165
Jul 25 11:05:27 * sshd[24413]: Failed password for invalid user postgres from 118.201.65.165 port 35200 ssh2
2020-07-25 17:11:22
104.236.48.174 attack
Jul 25 00:51:00 vps46666688 sshd[2464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.48.174
Jul 25 00:51:02 vps46666688 sshd[2464]: Failed password for invalid user bart from 104.236.48.174 port 60877 ssh2
...
2020-07-25 16:55:20
222.186.175.216 attack
Jul 25 10:58:49 minden010 sshd[26245]: Failed password for root from 222.186.175.216 port 49500 ssh2
Jul 25 10:58:52 minden010 sshd[26245]: Failed password for root from 222.186.175.216 port 49500 ssh2
Jul 25 10:58:55 minden010 sshd[26245]: Failed password for root from 222.186.175.216 port 49500 ssh2
Jul 25 10:59:02 minden010 sshd[26245]: error: maximum authentication attempts exceeded for root from 222.186.175.216 port 49500 ssh2 [preauth]
...
2020-07-25 16:59:59

Recently Reported IPs

47.159.153.66 130.249.251.116 46.218.113.85 81.29.117.98
5.133.207.208 223.186.198.7 125.218.7.94 219.27.218.18
234.193.182.161 97.12.47.37 176.88.148.0 68.21.46.185
177.94.36.182 101.40.147.251 134.199.134.116 133.44.155.60
180.172.208.184 231.48.67.122 220.175.173.2 146.59.58.234