Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Istanbul

Region: Istanbul

Country: Turkey

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.102.229.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2450
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.102.229.136.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025093000 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 30 17:58:10 CST 2025
;; MSG SIZE  rcvd: 108
Host info
136.229.102.149.in-addr.arpa domain name pointer unn-149-102-229-136.datapacket.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.229.102.149.in-addr.arpa	name = unn-149-102-229-136.datapacket.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
89.136.231.217 attackbots
Seq 2995002506
2019-12-07 03:34:29
13.68.175.90 attackspam
SSH bruteforce
2019-12-07 03:13:52
178.87.172.169 attackspam
Seq 2995002506
2019-12-07 03:19:33
129.204.50.75 attack
Nov 17 15:48:29 vtv3 sshd[23997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.50.75
Nov 17 15:48:31 vtv3 sshd[23997]: Failed password for invalid user graveline from 129.204.50.75 port 50224 ssh2
Nov 17 15:53:34 vtv3 sshd[25223]: Invalid user takuji from 129.204.50.75 port 57558
Nov 17 15:53:34 vtv3 sshd[25223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.50.75
Nov 17 16:03:39 vtv3 sshd[27720]: Invalid user stacy from 129.204.50.75 port 44002
Nov 17 16:03:39 vtv3 sshd[27720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.50.75
Nov 17 16:03:41 vtv3 sshd[27720]: Failed password for invalid user stacy from 129.204.50.75 port 44002 ssh2
Nov 17 16:08:57 vtv3 sshd[28996]: Invalid user bbbbb from 129.204.50.75 port 51352
Nov 17 16:08:57 vtv3 sshd[28996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.50.75
Nov 17 16:
2019-12-07 02:55:43
106.13.181.147 attack
Dec  6 19:47:09 ns3042688 sshd\[9347\]: Invalid user gwenette from 106.13.181.147
Dec  6 19:47:09 ns3042688 sshd\[9347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.181.147 
Dec  6 19:47:11 ns3042688 sshd\[9347\]: Failed password for invalid user gwenette from 106.13.181.147 port 33136 ssh2
Dec  6 19:56:44 ns3042688 sshd\[12659\]: Invalid user operator from 106.13.181.147
Dec  6 19:56:44 ns3042688 sshd\[12659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.181.147 
...
2019-12-07 03:06:43
175.173.152.62 attackbots
Seq 2995002506
2019-12-07 03:20:54
175.168.248.122 attackbots
Seq 2995002506
2019-12-07 03:22:07
37.114.133.121 attackspambots
Dec  6 15:47:34 [munged] sshd[28785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.114.133.121
2019-12-07 02:56:00
95.219.198.243 attackspambots
Seq 2995002506
2019-12-07 03:32:41
46.209.45.58 attackspam
Dec  6 19:07:31 tux-35-217 sshd\[6257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.209.45.58  user=root
Dec  6 19:07:33 tux-35-217 sshd\[6257\]: Failed password for root from 46.209.45.58 port 42598 ssh2
Dec  6 19:13:04 tux-35-217 sshd\[6296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.209.45.58  user=root
Dec  6 19:13:06 tux-35-217 sshd\[6296\]: Failed password for root from 46.209.45.58 port 40106 ssh2
...
2019-12-07 03:02:17
112.24.103.30 attackspambots
Seq 2995002506
2019-12-07 03:30:11
125.31.82.252 attackspam
Seq 2995002506
2019-12-07 03:23:48
109.207.126.142 attack
Seq 2995002506
2019-12-07 03:30:30
117.50.16.177 attack
Failed password for root from 117.50.16.177 port 51486 ssh2
2019-12-07 03:12:38
223.17.114.203 attack
Seq 2995002506
2019-12-07 03:15:37

Recently Reported IPs

107.175.32.136 10.10.25.152 195.178.110.160 11.32.231.179
143.198.40.168 204.114.103.4 151.241.108.225 208.87.240.0
173.197.14.229 186.13.211.50 85.207.54.88 20.15.163.169
138.68.150.191 68.183.80.104 104.16.103.112 13.220.159.1
13.221.195.80 195.178.110.64 218.84.127.14 218.84.127.13