Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Schenectady

Region: New York

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Union College

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.106.157.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51649
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;149.106.157.22.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082001 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Aug 21 01:35:39 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 22.157.106.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 22.157.106.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.133.111.183 attackspam
Unauthorized connection attempt detected from IP address 103.133.111.183 to port 3389 [T]
2020-07-22 02:57:39
123.59.194.42 attackbots
port scan and connect, tcp 1433 (ms-sql-s)
2020-07-22 02:53:41
52.227.173.224 attackbotsspam
Unauthorized connection attempt detected from IP address 52.227.173.224 to port 1433
2020-07-22 03:04:33
51.141.189.82 attackspam
Unauthorized connection attempt detected from IP address 51.141.189.82 to port 1433
2020-07-22 03:05:40
52.163.85.241 attackbotsspam
Unauthorized connection attempt detected from IP address 52.163.85.241 to port 1433 [T]
2020-07-22 02:43:54
52.231.165.27 attackbots
Unauthorized connection attempt detected from IP address 52.231.165.27 to port 1433
2020-07-22 03:03:43
20.185.231.189 attack
Jul 21 20:53:54 [host] sshd[12795]: Invalid user t
Jul 21 20:53:54 [host] sshd[12795]: pam_unix(sshd:
Jul 21 20:53:57 [host] sshd[12795]: Failed passwor
2020-07-22 03:08:51
37.49.230.148 attackspam
Unauthorized connection attempt detected from IP address 37.49.230.148 to port 25 [T]
2020-07-22 02:45:36
145.239.78.111 attackspambots
Jul 21 19:59:34 mail sshd[13898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.78.111
Jul 21 19:59:36 mail sshd[13898]: Failed password for invalid user zeus from 145.239.78.111 port 46086 ssh2
...
2020-07-22 02:52:16
62.33.169.22 attackspambots
Unauthorized connection attempt detected from IP address 62.33.169.22 to port 445 [T]
2020-07-22 03:02:36
177.91.79.21 attack
2020-07-21T18:40:07.226777centos sshd[29030]: Invalid user gregory from 177.91.79.21 port 40126
2020-07-21T18:40:09.265225centos sshd[29030]: Failed password for invalid user gregory from 177.91.79.21 port 40126 ssh2
2020-07-21T18:45:54.957368centos sshd[29357]: Invalid user testsftp from 177.91.79.21 port 38050
...
2020-07-22 03:15:55
40.115.158.247 attackspambots
Unauthorized connection attempt detected from IP address 40.115.158.247 to port 1433 [T]
2020-07-22 03:08:20
197.5.145.31 attack
Unauthorized connection attempt detected from IP address 197.5.145.31 to port 3389 [T]
2020-07-22 03:12:51
222.186.30.57 attack
Jul 21 16:48:20 vm0 sshd[8492]: Failed password for root from 222.186.30.57 port 47402 ssh2
Jul 21 21:10:53 vm0 sshd[31478]: Failed password for root from 222.186.30.57 port 51750 ssh2
...
2020-07-22 03:11:03
74.82.47.5 attack
Unauthorized connection attempt detected from IP address 74.82.47.5 to port 3389
2020-07-22 02:41:43

Recently Reported IPs

212.80.135.253 123.58.33.18 78.202.32.15 60.127.34.110
166.182.175.210 60.43.136.172 64.174.117.25 186.61.230.97
77.153.21.6 134.194.211.29 165.113.75.112 65.171.48.246
134.55.227.38 108.188.104.128 186.10.243.70 53.144.249.221
138.0.255.178 157.178.105.142 106.231.70.108 202.191.246.70