Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.11.130.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64638
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.11.130.119.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 06:23:47 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 119.130.11.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 119.130.11.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.163.116.89 attackbots
Automatic report - Port Scan Attack
2019-07-19 07:47:29
89.248.167.131 attackspambots
18.07.2019 23:21:24 Connection to port 8000 blocked by firewall
2019-07-19 07:55:57
171.104.192.3 attack
Jan 21 15:35:19 vpn sshd[15953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.104.192.3
Jan 21 15:35:21 vpn sshd[15953]: Failed password for invalid user yb from 171.104.192.3 port 58152 ssh2
Jan 21 15:43:51 vpn sshd[15999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.104.192.3
2019-07-19 07:24:09
170.79.120.4 attackbots
Jan  5 19:57:55 vpn sshd[933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.79.120.4
Jan  5 19:57:58 vpn sshd[933]: Failed password for invalid user test from 170.79.120.4 port 46586 ssh2
Jan  5 20:04:07 vpn sshd[962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.79.120.4
2019-07-19 07:28:53
169.57.2.72 attackspam
Nov 30 14:03:09 vpn sshd[4212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=169.57.2.72
Nov 30 14:03:11 vpn sshd[4212]: Failed password for invalid user alka from 169.57.2.72 port 40604 ssh2
Nov 30 14:06:42 vpn sshd[4252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=169.57.2.72
2019-07-19 08:03:09
112.85.42.237 attack
Jul 19 05:01:21 vibhu-HP-Z238-Microtower-Workstation sshd\[23621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
Jul 19 05:01:23 vibhu-HP-Z238-Microtower-Workstation sshd\[23621\]: Failed password for root from 112.85.42.237 port 43264 ssh2
Jul 19 05:02:05 vibhu-HP-Z238-Microtower-Workstation sshd\[23654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
Jul 19 05:02:07 vibhu-HP-Z238-Microtower-Workstation sshd\[23654\]: Failed password for root from 112.85.42.237 port 57595 ssh2
Jul 19 05:03:32 vibhu-HP-Z238-Microtower-Workstation sshd\[23726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
...
2019-07-19 07:35:35
118.200.199.43 attackbots
Jul 18 23:06:37 [munged] sshd[4952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.200.199.43  user=root
Jul 18 23:06:39 [munged] sshd[4952]: Failed password for root from 118.200.199.43 port 33948 ssh2
2019-07-19 07:54:30
91.106.193.72 attackbotsspam
2019-07-18T23:21:34.342841abusebot.cloudsearch.cf sshd\[9516\]: Invalid user devopsuser from 91.106.193.72 port 38234
2019-07-19 07:54:55
77.247.109.93 attackbots
Jul 18 21:01:41 artelis kernel: [1577339.924365] [UFW BLOCK] IN=eth0 OUT= MAC=c2:45:3b:cb:6e:17:ec:38:73:0c:70:30:08:00 SRC=77.247.109.93 DST=167.99.196.43 LEN=440 TOS=0x00 PREC=0x00 TTL=58 ID=611 DF PROTO=UDP SPT=5085 DPT=45770 LEN=420 
Jul 18 21:04:26 artelis kernel: [1577504.890519] [UFW BLOCK] IN=eth0 OUT= MAC=c2:45:3b:cb:6e:17:ec:38:73:0c:70:30:08:00 SRC=77.247.109.93 DST=167.99.196.43 LEN=441 TOS=0x00 PREC=0x00 TTL=58 ID=33506 DF PROTO=UDP SPT=5131 DPT=15170 LEN=421 
Jul 18 21:04:55 artelis kernel: [1577534.184138] [UFW BLOCK] IN=eth0 OUT= MAC=c2:45:3b:cb:6e:17:ec:38:73:0c:70:30:08:00 SRC=77.247.109.93 DST=167.99.196.43 LEN=439 TOS=0x00 PREC=0x00 TTL=58 ID=39416 DF PROTO=UDP SPT=5128 DPT=15162 LEN=419 
Jul 18 21:05:26 artelis kernel: [1577565.421922] [UFW BLOCK] IN=eth0 OUT= MAC=c2:45:3b:cb:6e:17:ec:38:73:0c:18:30:08:00 SRC=77.247.109.93 DST=167.99.196.43 LEN=442 TOS=0x00 PREC=0x00 TTL=58 ID=45698 DF PROTO=UDP SPT=5129 DPT=5093 LEN=422 
Jul 18 21:05:51 artelis kernel: [1577589.79
...
2019-07-19 07:43:41
173.225.111.11 attackbotsspam
Jul 18 23:06:19 s0 postfix/smtps/smtpd\[124944\]: NOQUEUE: reject: RCPT from unknown\[173.225.111.11\]: 554 5.7.1 \: Recipient address rejected: Access denied\; from=\ to=\ proto=SMTP helo=\
Jul 18 23:06:20 s0 postfix/smtps/smtpd\[124937\]: NOQUEUE: reject: RCPT from unknown\[173.225.111.11\]: 554 5.7.1 \: Recipient address rejected: Access denied\; from=\ to=\ proto=SMTP helo=\
...
2019-07-19 08:10:36
35.246.240.123 attack
xmlrpc attack
2019-07-19 07:50:04
170.81.130.18 attack
Mar  5 06:15:55 vpn sshd[4121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.81.130.18
Mar  5 06:15:57 vpn sshd[4121]: Failed password for invalid user br from 170.81.130.18 port 56158 ssh2
Mar  5 06:23:38 vpn sshd[4182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.81.130.18
2019-07-19 07:27:31
181.40.122.2 attack
Jul 19 01:47:19 vps647732 sshd[27743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.122.2
Jul 19 01:47:21 vps647732 sshd[27743]: Failed password for invalid user william from 181.40.122.2 port 36593 ssh2
...
2019-07-19 07:48:37
188.165.5.15 attackspambots
port scan and connect, tcp 80 (http)
2019-07-19 07:52:00
170.0.128.10 attackspam
Mar 13 03:20:58 vpn sshd[12393]: Failed password for root from 170.0.128.10 port 44663 ssh2
Mar 13 03:29:36 vpn sshd[12418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.0.128.10
Mar 13 03:29:38 vpn sshd[12418]: Failed password for invalid user jc2server from 170.0.128.10 port 35162 ssh2
2019-07-19 07:52:30

Recently Reported IPs

201.97.150.12 133.132.97.137 18.65.161.4 12.63.184.9
215.99.44.117 103.3.86.194 216.148.12.249 159.97.232.113
83.187.85.152 255.172.235.194 137.232.194.106 142.80.60.106
55.115.231.173 58.88.65.74 116.189.177.110 70.97.20.81
72.42.127.212 64.255.52.90 107.228.233.103 207.40.111.179