Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hessen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       149.102.0.0 - 149.102.255.255
CIDR:           149.102.0.0/16
NetName:        COGENT-149-102-16
NetHandle:      NET-149-102-0-0-1
Parent:         NET149 (NET-149-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Cogent Communications, LLC (COGC)
RegDate:        1992-01-28
Updated:        2025-09-23
Ref:            https://rdap.arin.net/registry/ip/149.102.0.0



OrgName:        Cogent Communications, LLC
OrgId:          COGC
Address:        2450 N Street NW
City:           Washington
StateProv:      DC
PostalCode:     20037
Country:        US
RegDate:        2000-05-30
Updated:        2025-09-23
Comment:        Geofeed https://geofeed.cogentco.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/entity/COGC

ReferralServer:  rwhois://rwhois.cogentco.com:4321

OrgTechHandle: IPALL-ARIN
OrgTechName:   IP Allocation
OrgTechPhone:  +1-877-875-4311 
OrgTechEmail:  ipalloc@cogentco.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPALL-ARIN

OrgNOCHandle: ZC108-ARIN
OrgNOCName:   Cogent Communications
OrgNOCPhone:  +1-877-875-4311 
OrgNOCEmail:  noc@cogentco.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ZC108-ARIN

OrgAbuseHandle: COGEN-ARIN
OrgAbuseName:   Cogent Abuse
OrgAbusePhone:  +1-877-875-4311 
OrgAbuseEmail:  abuse@cogentco.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/COGEN-ARIN

# end


# start

NetRange:       149.102.224.0 - 149.102.255.255
CIDR:           149.102.224.0/19
NetName:        DATACAMP-CGNT-NET-4
NetHandle:      NET-149-102-224-0-1
Parent:         COGENT-149-102-16 (NET-149-102-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   CDN77 (DL-807)
RegDate:        2022-10-21
Updated:        2022-10-21
Ref:            https://rdap.arin.net/registry/ip/149.102.224.0


OrgName:        CDN77
OrgId:          DL-807
Address:        207 Regent Street
City:           London
StateProv:      
PostalCode:     W1B 3HH
Country:        GB
RegDate:        2022-03-28
Updated:        2022-12-01
Ref:            https://rdap.arin.net/registry/entity/DL-807


OrgTechHandle: PROCH16-ARIN
OrgTechName:   Prochazka, Jiri 
OrgTechPhone:  +443308081648 
OrgTechEmail:  support@cdn77.com
OrgTechRef:    https://rdap.arin.net/registry/entity/PROCH16-ARIN

OrgRoutingHandle: CDNNO-ARIN
OrgRoutingName:   CDN77 NOC
OrgRoutingPhone:  +443308081648 
OrgRoutingEmail:  network@cdn77.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/CDNNO-ARIN

OrgAbuseHandle: CAC96-ARIN
OrgAbuseName:   CDN77 Abuse contact
OrgAbusePhone:  +443308081648 
OrgAbuseEmail:  abuse@datacamp.co.uk
OrgAbuseRef:    https://rdap.arin.net/registry/entity/CAC96-ARIN

OrgNOCHandle: PROCH16-ARIN
OrgNOCName:   Prochazka, Jiri 
OrgNOCPhone:  +443308081648 
OrgNOCEmail:  support@cdn77.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/PROCH16-ARIN

# end


# start

NetRange:       149.102.225.0 - 149.102.225.255
CIDR:           149.102.225.0/24
NetName:        CDNEXT-LAX-CG
NetHandle:      NET-149-102-225-0-1
Parent:         DATACAMP-CGNT-NET-4 (NET-149-102-224-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Datacamp Limited (C09035555)
RegDate:        2022-11-22
Updated:        2022-11-22
Ref:            https://rdap.arin.net/registry/ip/149.102.225.0


CustName:       Datacamp Limited
Address:        207 Regent Street
City:           London
StateProv:      
PostalCode:     W1B3HH
Country:        GB
RegDate:        2022-11-22
Updated:        2022-11-22
Ref:            https://rdap.arin.net/registry/entity/C09035555

OrgTechHandle: PROCH16-ARIN
OrgTechName:   Prochazka, Jiri 
OrgTechPhone:  +443308081648 
OrgTechEmail:  support@cdn77.com
OrgTechRef:    https://rdap.arin.net/registry/entity/PROCH16-ARIN

OrgRoutingHandle: CDNNO-ARIN
OrgRoutingName:   CDN77 NOC
OrgRoutingPhone:  +443308081648 
OrgRoutingEmail:  network@cdn77.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/CDNNO-ARIN

OrgAbuseHandle: CAC96-ARIN
OrgAbuseName:   CDN77 Abuse contact
OrgAbusePhone:  +443308081648 
OrgAbuseEmail:  abuse@datacamp.co.uk
OrgAbuseRef:    https://rdap.arin.net/registry/entity/CAC96-ARIN

OrgNOCHandle: PROCH16-ARIN
OrgNOCName:   Prochazka, Jiri 
OrgNOCPhone:  +443308081648 
OrgNOCEmail:  support@cdn77.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/PROCH16-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.cogentco.com:4321.

%rwhois V-1.5:0010b0:00 rwhois.cogentco.com (CGNT rwhoisd 1.2.2)
network:ID:NET4-9566E00013
network:Network-Name:NET4-9566E00013
network:IP-Network:149.102.224.0/19
network:Org-Name:Datacamp Limited
network:Street-Address:KLEYERSTRASSE 90
network:City:FRANKFURT
network:Country:DE
network:Postal-Code:60326
network:Tech-Contact:ZC108-ARIN
network:Updated:2025-11-04 17:33:55
%ok
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.102.225.184
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52782
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.102.225.184.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032401 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 25 03:30:05 CST 2026
;; MSG SIZE  rcvd: 108
Host info
184.225.102.149.in-addr.arpa domain name pointer unn-149-102-225-184.datapacket.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
184.225.102.149.in-addr.arpa	name = unn-149-102-225-184.datapacket.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
131.114.98.64 attack
Dec 13 23:22:29 ns41 sshd[21930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.114.98.64
Dec 13 23:22:29 ns41 sshd[21930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.114.98.64
2019-12-14 06:46:08
213.243.213.201 attack
scan z
2019-12-14 07:12:31
128.199.177.224 attack
Dec 13 20:34:02 server sshd\[12719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.177.224  user=root
Dec 13 20:34:03 server sshd\[12719\]: Failed password for root from 128.199.177.224 port 57082 ssh2
Dec 13 20:42:58 server sshd\[15433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.177.224  user=root
Dec 13 20:42:59 server sshd\[15433\]: Failed password for root from 128.199.177.224 port 35088 ssh2
Dec 13 20:49:07 server sshd\[17274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.177.224  user=adm
...
2019-12-14 07:04:27
140.246.124.36 attackspam
$f2bV_matches
2019-12-14 07:22:53
187.141.50.219 attack
Dec 13 20:37:18 ns3042688 sshd\[20412\]: Invalid user 123 from 187.141.50.219
Dec 13 20:37:18 ns3042688 sshd\[20412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.141.50.219 
Dec 13 20:37:20 ns3042688 sshd\[20412\]: Failed password for invalid user 123 from 187.141.50.219 port 36656 ssh2
Dec 13 20:43:16 ns3042688 sshd\[21731\]: Invalid user gisela123 from 187.141.50.219
Dec 13 20:43:16 ns3042688 sshd\[21731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.141.50.219 
...
2019-12-14 07:12:45
222.252.16.140 attackbots
Dec 13 23:35:45 srv206 sshd[1936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.16.140  user=root
Dec 13 23:35:48 srv206 sshd[1936]: Failed password for root from 222.252.16.140 port 45984 ssh2
...
2019-12-14 06:47:42
134.209.44.143 attackbots
134.209.44.143 - - [13/Dec/2019:21:59:13 +0000] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
134.209.44.143 - - [13/Dec/2019:21:59:13 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-12-14 06:49:09
183.240.150.193 attackspambots
Dec 13 22:52:57 v22018086721571380 sshd[17594]: Failed password for invalid user grullon from 183.240.150.193 port 40882 ssh2
2019-12-14 07:02:04
162.62.17.164 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-14 07:13:08
163.172.20.235 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-14 06:59:42
150.95.140.160 attackspam
fraudulent SSH attempt
2019-12-14 07:00:51
200.54.51.124 attackspam
detected by Fail2Ban
2019-12-14 06:50:26
139.59.69.76 attackspam
Dec 13 20:44:08 master sshd[29449]: Failed password for invalid user test from 139.59.69.76 port 46492 ssh2
Dec 13 20:54:22 master sshd[29462]: Failed password for invalid user re from 139.59.69.76 port 34268 ssh2
Dec 13 21:03:44 master sshd[29799]: Failed password for invalid user mazzolari from 139.59.69.76 port 44104 ssh2
Dec 13 21:12:30 master sshd[29805]: Failed password for invalid user revista from 139.59.69.76 port 53890 ssh2
Dec 13 21:22:47 master sshd[29831]: Failed password for invalid user sudha from 139.59.69.76 port 35338 ssh2
2019-12-14 06:48:50
49.149.102.167 attackbotsspam
Unauthorized connection attempt detected from IP address 49.149.102.167 to port 445
2019-12-14 07:03:07
107.174.235.61 attack
Dec 13 22:14:14 ns382633 sshd\[2414\]: Invalid user sra from 107.174.235.61 port 43199
Dec 13 22:14:14 ns382633 sshd\[2414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.174.235.61
Dec 13 22:14:16 ns382633 sshd\[2414\]: Failed password for invalid user sra from 107.174.235.61 port 43199 ssh2
Dec 13 22:35:32 ns382633 sshd\[6626\]: Invalid user speakec from 107.174.235.61 port 39982
Dec 13 22:35:32 ns382633 sshd\[6626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.174.235.61
2019-12-14 07:21:41

Recently Reported IPs

109.162.246.240 2606:4700:10::6814:6964 2606:4700:10::6814:8683 2606:4700:10::ac43:1637
2606:4700:10::ac43:1078 2606:4700:10::6816:1443 2606:4700:10::ac43:2188 2606:4700:10::6814:7892
2606:4700:10::6816:3385 2606:4700:10::6814:5516 2606:4700:10::6814:8824 66.132.172.230
1.186.229.191 195.43.136.207 112.124.57.42 54.211.15.44
100.27.192.197 2606:4700:10::ac43:1467 2606:4700:10::6816:1562 2606:4700:10::6816:4378