Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.159.136.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18148
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.159.136.149.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 03:39:08 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 149.136.159.146.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.136.159.146.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.45.106.135 attack
Automatic report - Banned IP Access
2020-10-09 23:48:40
218.108.186.218 attack
Oct  9 03:23:06 propaganda sshd[80141]: Connection from 218.108.186.218 port 44268 on 10.0.0.161 port 22 rdomain ""
Oct  9 03:23:06 propaganda sshd[80141]: Connection closed by 218.108.186.218 port 44268 [preauth]
2020-10-09 23:49:25
106.13.227.131 attack
Oct  9 15:06:00 host2 sshd[2100529]: Failed password for root from 106.13.227.131 port 55609 ssh2
Oct  9 15:06:32 host2 sshd[2100534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.227.131  user=root
Oct  9 15:06:34 host2 sshd[2100534]: Failed password for root from 106.13.227.131 port 59715 ssh2
Oct  9 15:07:01 host2 sshd[2100538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.227.131  user=root
Oct  9 15:07:04 host2 sshd[2100538]: Failed password for root from 106.13.227.131 port 63817 ssh2
...
2020-10-09 23:40:31
183.82.96.113 attackspam
Unauthorized connection attempt from IP address 183.82.96.113 on Port 445(SMB)
2020-10-09 23:36:38
62.210.206.78 attack
Oct  9 13:16:15 ns382633 sshd\[20100\]: Invalid user w from 62.210.206.78 port 38816
Oct  9 13:16:15 ns382633 sshd\[20100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.206.78
Oct  9 13:16:16 ns382633 sshd\[20100\]: Failed password for invalid user w from 62.210.206.78 port 38816 ssh2
Oct  9 13:20:22 ns382633 sshd\[20746\]: Invalid user git from 62.210.206.78 port 52138
Oct  9 13:20:22 ns382633 sshd\[20746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.206.78
2020-10-09 23:37:48
175.103.40.69 attackbots
2020-10-06 13:06:17,294 fail2ban.actions        [1205]: NOTICE  [apache-badbotsm] Unban 175.103.40.69
2020-10-09 12:14:46,295 fail2ban.actions        [1205]: NOTICE  [apache-badbotsy] Unban 175.103.40.69
...
2020-10-09 23:55:04
152.0.17.155 attack
152.0.17.155 - - \[08/Oct/2020:22:45:36 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 352 "-" "-"
2020-10-10 00:15:35
118.98.127.138 attackbotsspam
Brute force attempt
2020-10-09 23:40:06
165.227.95.163 attackspambots
ET SCAN NMAP -sS window 1024
2020-10-09 23:58:38
201.209.94.67 attack
20/10/8@16:46:01: FAIL: Alarm-Intrusion address from=201.209.94.67
...
2020-10-09 23:42:52
27.220.90.20 attackspambots
Unauthorized connection attempt detected from IP address 27.220.90.20 to port 23 [T]
2020-10-10 00:13:12
179.99.213.82 attack
Unauthorized connection attempt from IP address 179.99.213.82 on Port 445(SMB)
2020-10-09 23:38:31
218.92.0.145 attack
Oct  9 19:01:32 dignus sshd[890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145  user=root
Oct  9 19:01:34 dignus sshd[890]: Failed password for root from 218.92.0.145 port 23891 ssh2
Oct  9 19:01:50 dignus sshd[890]: error: maximum authentication attempts exceeded for root from 218.92.0.145 port 23891 ssh2 [preauth]
Oct  9 19:01:58 dignus sshd[908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145  user=root
Oct  9 19:02:00 dignus sshd[908]: Failed password for root from 218.92.0.145 port 52128 ssh2
...
2020-10-10 00:14:25
87.27.5.116 attack
Port probing on unauthorized port 23
2020-10-09 23:50:31
128.199.76.76 attackbotsspam
2020-10-09T08:11:25.344757shield sshd\[16648\]: Invalid user Jessa from 128.199.76.76 port 2242
2020-10-09T08:11:25.354291shield sshd\[16648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.76.76
2020-10-09T08:11:27.459332shield sshd\[16648\]: Failed password for invalid user Jessa from 128.199.76.76 port 2242 ssh2
2020-10-09T08:15:05.537047shield sshd\[16961\]: Invalid user Elgie from 128.199.76.76 port 43356
2020-10-09T08:15:05.545200shield sshd\[16961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.76.76
2020-10-10 00:03:28

Recently Reported IPs

148.153.28.84 144.144.166.123 137.25.108.160 247.141.194.163
35.225.151.172 109.71.67.43 63.187.8.140 103.26.42.229
96.191.203.127 202.31.120.251 118.175.21.9 213.26.173.68
103.206.36.75 250.104.254.49 162.40.243.227 212.96.173.48
239.39.199.76 144.244.182.142 236.251.5.227 164.119.110.42