Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Mexico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.205.149.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25504
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.205.149.119.		IN	A

;; AUTHORITY SECTION:
.			289	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 10:35:38 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 119.149.205.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 119.149.205.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
195.176.3.23 attack
195.176.3.23 (CH/Switzerland/tor5e1.digitale-gesellschaft.ch), 6 distributed webmin attacks on account [root] in the last 3600 secs
2020-07-05 17:21:54
46.38.150.72 attackspam
2020-07-05T03:41:40.993561linuxbox-skyline auth[596492]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=lovers rhost=46.38.150.72
...
2020-07-05 17:43:45
20.185.47.152 attackspambots
Jul  5 09:33:05 lnxweb61 sshd[24805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.185.47.152
Jul  5 09:33:05 lnxweb61 sshd[24805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.185.47.152
2020-07-05 17:29:20
162.243.132.210 attackspam
Port scan: Attack repeated for 24 hours
2020-07-05 17:35:53
62.210.157.10 attackspam
Jul  5 05:51:00 debian-2gb-nbg1-2 kernel: \[16179675.715386\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=62.210.157.10 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=22720 PROTO=TCP SPT=52333 DPT=999 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-05 17:27:44
172.94.24.57 attack
0,27-01/01 [bc01/m28] PostRequest-Spammer scoring: brussels
2020-07-05 17:30:08
121.227.31.13 attackbots
...
2020-07-05 17:10:25
159.65.158.172 attackspam
Jul  5 10:18:35 Ubuntu-1404-trusty-64-minimal sshd\[19358\]: Invalid user robin from 159.65.158.172
Jul  5 10:18:35 Ubuntu-1404-trusty-64-minimal sshd\[19358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.158.172
Jul  5 10:18:37 Ubuntu-1404-trusty-64-minimal sshd\[19358\]: Failed password for invalid user robin from 159.65.158.172 port 35772 ssh2
Jul  5 10:23:04 Ubuntu-1404-trusty-64-minimal sshd\[21678\]: Invalid user liz from 159.65.158.172
Jul  5 10:23:04 Ubuntu-1404-trusty-64-minimal sshd\[21678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.158.172
2020-07-05 17:40:10
134.209.176.220 attackspam
Unauthorized SSH login attempts
2020-07-05 17:21:14
94.16.121.91 attackbots
94.16.121.91 - - \[05/Jul/2020:05:51:01 +0200\] "GET /index.php\?id=ausland%27%2F%2A\&id=%2A%2FUNION%2F%2A\&id=%2A%2FALL%2F%2A\&id=%2A%2FSELECT%2F%2A\&id=%2A%2F2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=2770\&id=CHR%28113%29%7C%7CCHR%2898%29%7C%7CCHR%28122%29%7C%7CCHR%28107%29%7C%7CCHR%28113%29%7C%7CCHR%2875%29%7C%7CCHR%28119%29%7C%7CCHR%2899%29%7C%7CCHR%28119%29%7C%7CCHR%2878%29%7C%7CCHR%2899%29%7C%7CCHR%2899%29%7C%7CCHR%2877%29%7C%7CCHR%28104%29%7C%7CCHR%28105%29%7C%7CCHR%28106%29%7C%7CCHR%281
2020-07-05 17:27:30
128.199.210.252 attack
Jul  5 00:12:09 dignus sshd[14847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.210.252
Jul  5 00:12:11 dignus sshd[14847]: Failed password for invalid user remoto from 128.199.210.252 port 54161 ssh2
Jul  5 00:15:44 dignus sshd[15211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.210.252  user=root
Jul  5 00:15:47 dignus sshd[15211]: Failed password for root from 128.199.210.252 port 16808 ssh2
Jul  5 00:19:10 dignus sshd[15595]: Invalid user test2 from 128.199.210.252 port 43959
...
2020-07-05 17:49:43
45.125.65.52 attackspam
2020-07-05 12:33:54 auth_plain authenticator failed for (User) [45.125.65.52]: 535 Incorrect authentication data (set_id=reserve@lavrinenko.info,)
2020-07-05 12:41:20 auth_plain authenticator failed for (User) [45.125.65.52]: 535 Incorrect authentication data (set_id=sport)
...
2020-07-05 17:42:11
200.133.39.24 attackspam
Invalid user paula from 200.133.39.24 port 40458
2020-07-05 17:48:41
146.88.240.4 attackspambots
 UDP 146.88.240.4:49381 -> port 500, len 74
2020-07-05 17:31:35
138.197.144.141 attackbotsspam
prod8
...
2020-07-05 17:20:52

Recently Reported IPs

223.226.129.31 81.33.20.149 46.249.123.132 27.208.152.60
101.108.123.195 176.61.143.85 175.182.99.150 162.241.216.119
222.218.107.196 187.163.141.178 197.62.51.119 154.202.103.114
103.59.203.169 223.87.179.36 76.107.18.130 49.244.90.118
61.186.52.68 120.143.48.62 123.8.4.94 41.73.6.99