Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.125.104.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13668
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.125.104.149.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 11:07:24 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 149.104.125.147.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.104.125.147.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
149.202.56.194 attackspam
Jul  7 08:49:01 vserver sshd\[11255\]: Failed password for root from 149.202.56.194 port 40550 ssh2Jul  7 08:51:10 vserver sshd\[11266\]: Invalid user testuser from 149.202.56.194Jul  7 08:51:12 vserver sshd\[11266\]: Failed password for invalid user testuser from 149.202.56.194 port 37522 ssh2Jul  7 08:53:13 vserver sshd\[11287\]: Invalid user jamal from 149.202.56.194
...
2019-07-07 16:35:44
112.109.90.5 attack
2019-07-07T08:08:40.242962abusebot-4.cloudsearch.cf sshd\[19210\]: Invalid user agus from 112.109.90.5 port 57138
2019-07-07 16:12:14
201.46.59.159 attack
Excessive failed login attempts on port 587
2019-07-07 16:41:40
165.227.46.221 attackbots
Jul  7 08:45:37 apollo sshd\[10221\]: Invalid user siva from 165.227.46.221Jul  7 08:45:39 apollo sshd\[10221\]: Failed password for invalid user siva from 165.227.46.221 port 42486 ssh2Jul  7 08:52:57 apollo sshd\[10251\]: Invalid user mysql from 165.227.46.221
...
2019-07-07 17:05:48
46.33.52.19 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-07 00:10:45,310 INFO [shellcode_manager] (46.33.52.19) no match, writing hexdump (eabaaae5c87ca988e3fbc6e17dc3cb80 :2128157) - MS17010 (EternalBlue)
2019-07-07 16:14:20
80.19.136.122 attackbots
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(07070954)
2019-07-07 16:30:59
122.228.19.80 attack
Multiport scan : 22 ports scanned 13 80 111 666 771 1234 1583 2002 2049 4040 4369 4500 4567 5222 5601 8060 8099 8545 9418 12000 23424 41795
2019-07-07 17:04:19
121.14.70.29 attack
Apr 14 03:35:43 vtv3 sshd\[15491\]: Invalid user lib from 121.14.70.29 port 55820
Apr 14 03:35:43 vtv3 sshd\[15491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.14.70.29
Apr 14 03:35:45 vtv3 sshd\[15491\]: Failed password for invalid user lib from 121.14.70.29 port 55820 ssh2
Apr 14 03:37:17 vtv3 sshd\[16075\]: Invalid user alexie from 121.14.70.29 port 34171
Apr 14 03:37:17 vtv3 sshd\[16075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.14.70.29
Apr 16 14:11:33 vtv3 sshd\[5573\]: Invalid user mm from 121.14.70.29 port 41614
Apr 16 14:11:33 vtv3 sshd\[5573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.14.70.29
Apr 16 14:11:35 vtv3 sshd\[5573\]: Failed password for invalid user mm from 121.14.70.29 port 41614 ssh2
Apr 16 14:13:15 vtv3 sshd\[6224\]: Invalid user Hemmo from 121.14.70.29 port 48251
Apr 16 14:13:15 vtv3 sshd\[6224\]: pam_unix\(sshd:auth\): authe
2019-07-07 16:45:39
216.218.206.68 attack
Port scan: Attack repeated for 24 hours 216.218.206.68 - - [06/Jul/2018:16:42:39  0300] "GET / HTTP/1.1" 404 1832 "-" "-"
216.218.206.68 - - [24/Jun/2018:18:29:56  0300] "GET / HTTP/1.1" 404 1832 "-" "-"
216.218.206.68 - - [28/Jun/2018:18:26:34  0300] "GET / HTTP/1.1" 404 1832 "-" "-"
2019-07-07 16:48:12
111.230.152.118 attackspambots
leo_www
2019-07-07 16:55:51
103.245.11.171 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-06-06/07-07]4pkt,1pt.(tcp)
2019-07-07 16:25:00
209.216.230.30 attack
Reported by AbuseIPDB proxy server.
2019-07-07 16:26:04
140.143.136.89 attackbotsspam
Invalid user acer from 140.143.136.89 port 39220
2019-07-07 16:58:34
206.180.160.83 attack
445/tcp 445/tcp 445/tcp...
[2019-05-07/07-07]14pkt,1pt.(tcp)
2019-07-07 16:49:24
182.72.199.106 attackbotsspam
Jul  7 04:45:44 localhost sshd\[20330\]: Invalid user testuser from 182.72.199.106 port 51023
Jul  7 04:45:44 localhost sshd\[20330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.199.106
Jul  7 04:45:47 localhost sshd\[20330\]: Failed password for invalid user testuser from 182.72.199.106 port 51023 ssh2
...
2019-07-07 16:37:55

Recently Reported IPs

27.182.157.255 47.88.223.245 164.233.98.70 190.137.103.198
152.223.44.201 139.233.127.179 21.241.153.214 188.184.158.50
29.16.45.139 212.165.20.241 2.120.178.253 161.184.229.188
20.166.183.136 191.143.147.89 58.249.236.224 44.199.180.192
241.185.241.162 46.131.213.56 46.9.19.139 249.64.254.80