Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.114.80.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60803
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.114.80.197.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 17:59:24 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 197.80.114.149.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 149.114.80.197.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
13.54.244.238 attackbots
2020-04-25T03:48:53.531817+00:00 [f2b-wordpress-hard-ddos] : Authentication attempt user [munged] from 13.54.244.238
2020-04-25T03:48:37.119616+00:00 [f2b-wordpress-hard-ddos] : Authentication attempt user [munged] from 13.54.244.238
2020-04-25T03:48:22.124388+00:00 [f2b-wordpress-hard-ddos] : Authentication attempt user [munged] from 13.54.244.238
2020-04-25 19:09:37
178.248.87.116 attackbots
Invalid user ssingh from 178.248.87.116 port 53990
2020-04-25 18:43:30
180.244.171.209 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-25 18:59:10
51.38.238.165 attack
Invalid user tester from 51.38.238.165 port 60768
2020-04-25 18:50:23
103.40.8.144 attack
Invalid user gy from 103.40.8.144 port 44414
2020-04-25 18:47:51
185.120.206.17 attackbotsspam
" "
2020-04-25 18:34:36
61.148.16.162 attackbots
Apr 24 19:28:51 tdfoods sshd\[30747\]: Invalid user razvan from 61.148.16.162
Apr 24 19:28:51 tdfoods sshd\[30747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.148.16.162
Apr 24 19:28:53 tdfoods sshd\[30747\]: Failed password for invalid user razvan from 61.148.16.162 port 60630 ssh2
Apr 24 19:33:26 tdfoods sshd\[31120\]: Invalid user james from 61.148.16.162
Apr 24 19:33:26 tdfoods sshd\[31120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.148.16.162
2020-04-25 19:04:19
140.143.9.142 attackbots
Apr 25 12:29:10 meumeu sshd[14587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.9.142 
Apr 25 12:29:12 meumeu sshd[14587]: Failed password for invalid user servers from 140.143.9.142 port 56816 ssh2
Apr 25 12:32:33 meumeu sshd[15127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.9.142 
...
2020-04-25 18:35:18
77.247.181.162 attackspam
Automatic report - Port Scan
2020-04-25 18:49:30
46.105.191.88 attackbotsspam
xmlrpc attack
2020-04-25 18:50:41
42.101.43.186 attack
Invalid user testing from 42.101.43.186 port 55142
2020-04-25 18:58:14
106.13.161.132 attackspam
Apr 25 09:34:18 l03 sshd[6244]: Invalid user test from 106.13.161.132 port 36044
...
2020-04-25 19:04:03
45.55.233.213 attackbotsspam
Apr 25 12:20:19 DAAP sshd[19144]: Invalid user sunandita from 45.55.233.213 port 49840
Apr 25 12:20:19 DAAP sshd[19144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.233.213
Apr 25 12:20:19 DAAP sshd[19144]: Invalid user sunandita from 45.55.233.213 port 49840
Apr 25 12:20:20 DAAP sshd[19144]: Failed password for invalid user sunandita from 45.55.233.213 port 49840 ssh2
Apr 25 12:27:05 DAAP sshd[19189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.233.213  user=root
Apr 25 12:27:06 DAAP sshd[19189]: Failed password for root from 45.55.233.213 port 45122 ssh2
...
2020-04-25 18:32:13
82.64.214.105 attack
Port 22 Scan, PTR: None
2020-04-25 18:35:38
107.151.148.92 attackspambots
TCP port 8080: Scan and connection
2020-04-25 18:59:29

Recently Reported IPs

164.105.10.136 17.131.151.238 136.78.231.227 26.182.210.99
83.179.252.190 42.255.193.193 164.59.202.48 18.18.144.162
141.30.43.182 173.99.13.33 30.132.26.160 221.40.85.120
191.30.76.109 72.4.154.113 161.63.216.199 243.35.164.91
140.216.231.27 41.193.50.143 239.193.13.107 229.217.230.241