Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Saudi Arabia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.109.12.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 236
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.109.12.168.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 04:28:32 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 168.12.109.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 168.12.109.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.203.182.127 attackbots
Nov 29 06:58:46 sauna sshd[86667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.182.127
Nov 29 06:58:48 sauna sshd[86667]: Failed password for invalid user password from 159.203.182.127 port 33521 ssh2
...
2019-11-29 13:13:43
106.54.19.67 attack
2019-11-29T04:58:16.687276abusebot-8.cloudsearch.cf sshd\[14187\]: Invalid user fredra from 106.54.19.67 port 54796
2019-11-29 13:31:33
182.77.123.134 attackbots
Tried sshing with brute force.
2019-11-29 13:12:21
159.65.171.113 attackspambots
$f2bV_matches
2019-11-29 09:29:02
133.130.99.77 attackbotsspam
Nov 28 19:25:12 web1 sshd\[1206\]: Invalid user heine from 133.130.99.77
Nov 28 19:25:12 web1 sshd\[1206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.99.77
Nov 28 19:25:14 web1 sshd\[1206\]: Failed password for invalid user heine from 133.130.99.77 port 35388 ssh2
Nov 28 19:28:35 web1 sshd\[1531\]: Invalid user kudo from 133.130.99.77
Nov 28 19:28:35 web1 sshd\[1531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.99.77
2019-11-29 13:35:11
212.129.52.3 attackspam
Nov 29 05:58:48 nextcloud sshd\[30523\]: Invalid user cimp from 212.129.52.3
Nov 29 05:58:48 nextcloud sshd\[30523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.52.3
Nov 29 05:58:49 nextcloud sshd\[30523\]: Failed password for invalid user cimp from 212.129.52.3 port 29141 ssh2
...
2019-11-29 13:11:55
106.13.87.170 attackspam
Nov 29 05:53:41 minden010 sshd[17235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.87.170
Nov 29 05:53:44 minden010 sshd[17235]: Failed password for invalid user assomption from 106.13.87.170 port 56220 ssh2
Nov 29 05:58:07 minden010 sshd[18702]: Failed password for root from 106.13.87.170 port 60294 ssh2
...
2019-11-29 13:35:32
104.131.82.112 attackspambots
Nov 29 06:02:35 markkoudstaal sshd[22539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.82.112
Nov 29 06:02:36 markkoudstaal sshd[22539]: Failed password for invalid user denis2 from 104.131.82.112 port 37773 ssh2
Nov 29 06:06:58 markkoudstaal sshd[22920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.82.112
2019-11-29 13:10:23
129.211.27.10 attackspambots
$f2bV_matches
2019-11-29 13:04:47
190.246.33.145 attackbotsspam
Automatic report - Banned IP Access
2019-11-29 13:17:40
104.227.60.54 attackspam
(From impressivedesignz4u@gmail.com) Hello,

I have run some diagnostic tools on your website and saw immediately that there is plenty of room for improvement. With a few upgrades on your existing platform, your website can start generating more sales, leads, and more business. Your website is your most important digital asset out on the Web, and it's time that it got the upgrade that it sorely needs. 

Search engines like Google have a way of accessing websites to look for certain keywords and elements that will highlight what your site is all about. I specialize in making sure that search algorithms find what they need on your website to put it on top of the search results.

I'll be glad to give you more detailed information about how you can make your website more profitable and what the results will be during a free consultation. Kindly reply to let me know when's the best time to give in touch with you if you're interested. I look forward to hearing back from you.

Kurt Caldwell
2019-11-29 13:38:25
113.125.119.83 attack
2019-11-29T05:48:45.629464  sshd[5577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.119.83  user=root
2019-11-29T05:48:47.257663  sshd[5577]: Failed password for root from 113.125.119.83 port 46152 ssh2
2019-11-29T05:53:17.114170  sshd[5634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.119.83  user=root
2019-11-29T05:53:19.083706  sshd[5634]: Failed password for root from 113.125.119.83 port 51442 ssh2
2019-11-29T05:58:02.841028  sshd[5701]: Invalid user cyrus from 113.125.119.83 port 56726
...
2019-11-29 13:37:36
106.12.152.194 attackspam
11/28/2019-23:59:06.975780 106.12.152.194 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-29 13:02:24
118.24.38.53 attackspam
Nov 28 23:43:23 serwer sshd\[17404\]: Invalid user bob from 118.24.38.53 port 54992
Nov 28 23:43:23 serwer sshd\[17404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.38.53
Nov 28 23:43:25 serwer sshd\[17404\]: Failed password for invalid user bob from 118.24.38.53 port 54992 ssh2
...
2019-11-29 09:29:28
49.88.112.67 attackspambots
Nov 29 01:58:42 firewall sshd[544]: Failed password for root from 49.88.112.67 port 34584 ssh2
Nov 29 01:58:45 firewall sshd[544]: Failed password for root from 49.88.112.67 port 34584 ssh2
Nov 29 01:58:48 firewall sshd[544]: Failed password for root from 49.88.112.67 port 34584 ssh2
...
2019-11-29 13:13:01

Recently Reported IPs

213.196.226.5 100.63.81.72 30.19.131.191 176.240.114.80
18.236.174.221 231.52.236.163 194.147.162.222 143.29.194.233
25.116.133.80 162.152.46.229 206.181.47.86 14.11.132.90
201.128.18.129 64.38.252.98 21.61.52.231 149.167.27.163
129.93.98.185 64.179.143.30 249.99.229.140 235.47.51.224