Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jakarta

Region: Jakarta Raya

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.108.20.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 109
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.108.20.19.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121502 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 16 12:05:00 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 19.20.108.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 19.20.108.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
179.107.7.49 attackspambots
Automatic report - Banned IP Access
2020-06-14 05:19:27
46.187.244.180 attack
Failed password for invalid user from 46.187.244.180 port 33498 ssh2
2020-06-14 05:07:28
196.206.254.240 attack
invalid user
2020-06-14 05:38:37
218.92.0.215 attackbotsspam
2020-06-13T23:33:17.496254sd-86998 sshd[17932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.215  user=root
2020-06-13T23:33:19.815733sd-86998 sshd[17932]: Failed password for root from 218.92.0.215 port 10535 ssh2
2020-06-13T23:33:22.176859sd-86998 sshd[17932]: Failed password for root from 218.92.0.215 port 10535 ssh2
2020-06-13T23:33:17.496254sd-86998 sshd[17932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.215  user=root
2020-06-13T23:33:19.815733sd-86998 sshd[17932]: Failed password for root from 218.92.0.215 port 10535 ssh2
2020-06-13T23:33:22.176859sd-86998 sshd[17932]: Failed password for root from 218.92.0.215 port 10535 ssh2
2020-06-13T23:33:17.496254sd-86998 sshd[17932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.215  user=root
2020-06-13T23:33:19.815733sd-86998 sshd[17932]: Failed password for root from 218.92.0.215 p
...
2020-06-14 05:34:39
14.98.4.82 attackbots
IP blocked
2020-06-14 05:17:35
148.70.108.183 attackbotsspam
2020-06-13T21:02:20.671737abusebot.cloudsearch.cf sshd[9083]: Invalid user pop from 148.70.108.183 port 45650
2020-06-13T21:02:20.677265abusebot.cloudsearch.cf sshd[9083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.108.183
2020-06-13T21:02:20.671737abusebot.cloudsearch.cf sshd[9083]: Invalid user pop from 148.70.108.183 port 45650
2020-06-13T21:02:22.394948abusebot.cloudsearch.cf sshd[9083]: Failed password for invalid user pop from 148.70.108.183 port 45650 ssh2
2020-06-13T21:05:51.094385abusebot.cloudsearch.cf sshd[9327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.108.183  user=root
2020-06-13T21:05:52.777176abusebot.cloudsearch.cf sshd[9327]: Failed password for root from 148.70.108.183 port 53586 ssh2
2020-06-13T21:09:20.006762abusebot.cloudsearch.cf sshd[9561]: Invalid user admin from 148.70.108.183 port 33276
...
2020-06-14 05:38:02
165.227.203.162 attackspambots
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-06-14 05:09:09
114.101.247.92 attackbots
Jun 12 11:51:12 HOST sshd[3752]: Failed password for invalid user koes from 114.101.247.92 port 41824 ssh2
Jun 12 11:51:14 HOST sshd[3752]: Received disconnect from 114.101.247.92: 11: Bye Bye [preauth]
Jun 12 11:53:47 HOST sshd[3855]: Failed password for invalid user ubnt from 114.101.247.92 port 54473 ssh2
Jun 12 11:53:47 HOST sshd[3855]: Received disconnect from 114.101.247.92: 11: Bye Bye [preauth]
Jun 12 11:56:06 HOST sshd[3926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.101.247.92  user=r.r
Jun 12 11:56:09 HOST sshd[3926]: Failed password for r.r from 114.101.247.92 port 38890 ssh2
Jun 12 11:56:09 HOST sshd[3926]: Received disconnect from 114.101.247.92: 11: Bye Bye [preauth]
Jun 12 12:03:13 HOST sshd[4138]: Failed password for invalid user admin from 114.101.247.92 port 48598 ssh2
Jun 12 12:03:14 HOST sshd[4138]: Received disconnect from 114.101.247.92: 11: Bye Bye [preauth]
Jun 12 12:05:36 HOST sshd[4221]: Receiv........
-------------------------------
2020-06-14 05:32:39
178.126.53.168 attackspambots
12-6-2020 15:38:40	Unauthorized connection attempt (Brute-Force).
12-6-2020 15:38:40	Connection from IP address: 178.126.53.168 on port: 587


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=178.126.53.168
2020-06-14 05:39:04
2a03:b0c0:3:e0::233:7001 attack
162.158.88.224 2a03:b0c0:3:e0::233:7001 - [13/Jun/2020:21:04:15 +0000] "POST /wp-login.php HTTP/1.1" 302 Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0 0 PHP/7.3.17 338769
162.158.88.38 2a03:b0c0:3:e0::233:7001 - [13/Jun/2020:21:04:16 +0000] "POST /wp-login.php HTTP/1.1" 200 Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0 1933 PHP/7.3.17 348539
162.158.94.158 2a03:b0c0:3:e0::233:7001 - [13/Jun/2020:21:04:16 +0000] "POST /wp-login.php HTTP/1.1" 302 Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0 0 PHP/7.3.17 324702
2020-06-14 05:25:24
58.230.147.230 attackbotsspam
Jun 13 23:05:54 localhost sshd\[19278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.230.147.230  user=root
Jun 13 23:05:56 localhost sshd\[19278\]: Failed password for root from 58.230.147.230 port 57161 ssh2
Jun 13 23:09:24 localhost sshd\[19452\]: Invalid user sysadmin from 58.230.147.230
Jun 13 23:09:24 localhost sshd\[19452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.230.147.230
Jun 13 23:09:27 localhost sshd\[19452\]: Failed password for invalid user sysadmin from 58.230.147.230 port 57575 ssh2
...
2020-06-14 05:31:50
41.72.219.102 attackspam
Jun 13 23:09:33 jane sshd[32454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.72.219.102 
Jun 13 23:09:35 jane sshd[32454]: Failed password for invalid user lbitcku from 41.72.219.102 port 36088 ssh2
...
2020-06-14 05:25:56
218.92.0.212 attack
Jun 13 21:15:47 django-0 sshd\[4185\]: Failed password for root from 218.92.0.212 port 56428 ssh2Jun 13 21:16:06 django-0 sshd\[4189\]: Failed password for root from 218.92.0.212 port 20861 ssh2Jun 13 21:16:29 django-0 sshd\[4201\]: Failed password for root from 218.92.0.212 port 49712 ssh2
...
2020-06-14 05:15:06
223.171.32.55 attackspambots
Jun 13 23:04:10 buvik sshd[6142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.32.55
Jun 13 23:04:13 buvik sshd[6142]: Failed password for invalid user shupin from 223.171.32.55 port 46700 ssh2
Jun 13 23:09:10 buvik sshd[6876]: Invalid user salva from 223.171.32.55
...
2020-06-14 05:41:31
106.54.140.250 attackspambots
Jun 13 22:09:38 ajax sshd[2633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.140.250 
Jun 13 22:09:40 ajax sshd[2633]: Failed password for invalid user benny from 106.54.140.250 port 38844 ssh2
2020-06-14 05:21:21

Recently Reported IPs

197.34.124.243 30.15.130.208 249.246.104.173 162.177.232.2
105.42.110.151 187.93.98.35 117.148.188.37 251.210.185.158
163.251.157.151 129.169.50.178 9.110.187.80 111.190.9.221
125.18.173.225 170.205.84.141 98.22.181.204 168.243.138.215
170.251.184.45 130.191.158.159 179.187.232.250 90.191.82.187