Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Adana

Region: Adana

Country: Turkey

Internet Service Provider: Vodafone

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 149.0.0.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43718
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;149.0.0.0.			IN	A

;; Query time: 1 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Jun 26 18:14:37 CST 2021
;; MSG SIZE  rcvd: 38

'
Host info
Host 0.0.0.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 0.0.0.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
211.159.241.77 attackspambots
Feb 26 14:03:43 server sshd\[14776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.241.77 
Feb 26 14:03:45 server sshd\[14776\]: Failed password for invalid user sirius from 211.159.241.77 port 32824 ssh2
Feb 26 20:13:32 server sshd\[14196\]: Invalid user gek from 211.159.241.77
Feb 26 20:13:32 server sshd\[14196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.241.77 
Feb 26 20:13:34 server sshd\[14196\]: Failed password for invalid user gek from 211.159.241.77 port 47530 ssh2
...
2020-02-27 02:19:58
162.243.132.60 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-27 01:54:48
162.243.134.245 attackbotsspam
Port 109 scan denied
2020-02-27 01:50:05
46.105.227.206 attackspam
SSH Bruteforce attempt
2020-02-27 02:19:33
211.169.249.156 attackspam
$f2bV_matches
2020-02-27 02:19:08
211.159.173.3 attackbotsspam
$f2bV_matches
2020-02-27 02:23:46
71.6.146.186 attackspambots
Port 4063 scan denied
2020-02-27 02:02:44
162.243.133.18 attack
Port probing on unauthorized port 264
2020-02-27 01:53:48
92.119.160.13 attackspam
Port 3389 (MS RDP) access denied
2020-02-27 01:58:27
162.243.132.170 attackspam
Port 27018 scan denied
2020-02-27 01:54:11
162.243.131.223 attack
firewall-block, port(s): 445/tcp
2020-02-27 01:55:23
211.159.175.1 attackbotsspam
$f2bV_matches
2020-02-27 02:22:33
80.82.65.74 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 70 - port: 1001 proto: TCP cat: Misc Attack
2020-02-27 02:00:53
112.85.42.173 attackspam
Feb 26 19:21:40 sso sshd[22080]: Failed password for root from 112.85.42.173 port 14584 ssh2
Feb 26 19:21:44 sso sshd[22080]: Failed password for root from 112.85.42.173 port 14584 ssh2
...
2020-02-27 02:28:25
66.198.240.61 attackbots
Automatic report - XMLRPC Attack
2020-02-27 02:07:49

Recently Reported IPs

165.0.0.0 168.0.0.0 173.0.0.0 174.0.0.0
175.0.0.0 178.0.0.0 180.0.0.0 181.0.0.0
182.0.0.0 185.0.0.0 187.0.0.0 190.0.0.0
192.210.207.83 193.0.0.0 151.110.13.100 125.165.110.67
11.90.150.253 109.247.41.172 104.18.31.180 209.141.50.60