Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Saudi Arabia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.109.243.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6711
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.109.243.147.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 19:59:00 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 147.243.109.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.243.109.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.210.68.185 attack
(ftpd) Failed FTP login from 190.210.68.185 (AR/Argentina/mail.colfacor.org.ar): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: May 12 10:47:27 ir1 pure-ftpd: (?@190.210.68.185) [WARNING] Authentication failed for user [anonymous]
2020-05-12 16:36:06
51.77.212.235 attack
May 12 08:50:36 host sshd[62679]: Invalid user admin from 51.77.212.235 port 58326
...
2020-05-12 16:10:28
167.71.159.195 attack
May 12 17:40:50 localhost sshd[971747]: Invalid user oracache from 167.71.159.195 port 56084
...
2020-05-12 15:59:07
52.38.62.179 attack
Flask-IPban - exploit URL requested:/wp-login.php
2020-05-12 15:57:23
116.105.195.243 attackspam
2020-05-12T09:55:22.291863shiva sshd[2039]: Invalid user user from 116.105.195.243 port 18634
2020-05-12T09:55:59.436866shiva sshd[2044]: Invalid user admin from 116.105.195.243 port 29242
2020-05-12T09:56:11.451001shiva sshd[2047]: Invalid user admin from 116.105.195.243 port 19886
2020-05-12T09:56:24.095418shiva sshd[2064]: Invalid user admin from 116.105.195.243 port 57620
...
2020-05-12 16:22:11
27.124.45.250 attackspam
Icarus honeypot on github
2020-05-12 16:16:08
115.79.195.111 attackbotsspam
20/5/11@23:50:55: FAIL: Alarm-Network address from=115.79.195.111
...
2020-05-12 15:57:49
167.114.98.229 attack
May 12 10:04:39 sip sshd[227174]: Failed password for invalid user system from 167.114.98.229 port 56564 ssh2
May 12 10:08:28 sip sshd[227233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.98.229  user=root
May 12 10:08:30 sip sshd[227233]: Failed password for root from 167.114.98.229 port 38048 ssh2
...
2020-05-12 16:32:13
158.69.218.92 attackbotsspam
SQL Injection
2020-05-12 16:07:12
37.152.182.213 attack
May 12 07:44:51 PorscheCustomer sshd[25409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.152.182.213
May 12 07:44:52 PorscheCustomer sshd[25409]: Failed password for invalid user spoj0 from 37.152.182.213 port 42578 ssh2
May 12 07:49:17 PorscheCustomer sshd[25650]: Failed password for postgres from 37.152.182.213 port 51246 ssh2
...
2020-05-12 16:00:52
128.199.254.89 attack
May 12 10:07:45 server sshd[31723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.254.89
May 12 10:07:47 server sshd[31723]: Failed password for invalid user sj from 128.199.254.89 port 39730 ssh2
May 12 10:11:53 server sshd[32351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.254.89
...
2020-05-12 16:15:24
59.10.5.97 attack
May 12 07:45:39 web8 sshd\[4267\]: Invalid user nexthink from 59.10.5.97
May 12 07:45:39 web8 sshd\[4267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.10.5.97
May 12 07:45:41 web8 sshd\[4267\]: Failed password for invalid user nexthink from 59.10.5.97 port 38696 ssh2
May 12 07:49:24 web8 sshd\[6102\]: Invalid user prosper from 59.10.5.97
May 12 07:49:24 web8 sshd\[6102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.10.5.97
2020-05-12 16:01:47
106.13.206.183 attackspambots
bruteforce detected
2020-05-12 16:35:10
180.246.126.62 attack
F2B blocked SSH BF
2020-05-12 16:21:49
14.228.121.233 attackspam
[MK-VM5] Blocked by UFW
2020-05-12 16:12:10

Recently Reported IPs

61.0.219.8 215.130.16.176 63.233.74.204 39.167.238.192
246.27.152.118 29.238.17.200 68.187.201.14 70.221.139.142
209.10.136.142 231.96.118.64 253.41.4.248 45.255.55.147
156.160.78.76 213.11.51.219 200.211.66.89 135.100.5.178
225.156.91.93 222.26.210.227 123.22.241.39 106.20.182.68