Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.118.26.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21518
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.118.26.164.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 22:02:10 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 164.26.118.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.26.118.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
138.121.56.64 attackspambots
" "
2019-11-24 05:05:10
50.197.38.230 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/50.197.38.230/ 
 
 US - 1H : (130)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN7922 
 
 IP : 50.197.38.230 
 
 CIDR : 50.192.0.0/13 
 
 PREFIX COUNT : 1512 
 
 UNIQUE IP COUNT : 70992640 
 
 
 ATTACKS DETECTED ASN7922 :  
  1H - 2 
  3H - 3 
  6H - 5 
 12H - 8 
 24H - 21 
 
 DateTime : 2019-11-23 15:18:51 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-11-24 05:20:18
118.25.195.244 attack
Nov 23 21:52:59 server sshd\[10000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.195.244  user=root
Nov 23 21:53:02 server sshd\[10000\]: Failed password for root from 118.25.195.244 port 53516 ssh2
Nov 23 22:03:43 server sshd\[12933\]: Invalid user squid from 118.25.195.244
Nov 23 22:03:43 server sshd\[12933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.195.244 
Nov 23 22:03:45 server sshd\[12933\]: Failed password for invalid user squid from 118.25.195.244 port 35734 ssh2
...
2019-11-24 04:52:56
183.94.209.114 attackspam
badbot
2019-11-24 05:22:49
80.185.214.123 attack
Nov 23 17:38:59 Ubuntu-1404-trusty-64-minimal sshd\[13503\]: Invalid user admin from 80.185.214.123
Nov 23 17:38:59 Ubuntu-1404-trusty-64-minimal sshd\[13503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.185.214.123
Nov 23 17:39:00 Ubuntu-1404-trusty-64-minimal sshd\[13503\]: Failed password for invalid user admin from 80.185.214.123 port 59626 ssh2
Nov 23 21:17:21 Ubuntu-1404-trusty-64-minimal sshd\[16536\]: Invalid user ftp_user from 80.185.214.123
Nov 23 21:17:21 Ubuntu-1404-trusty-64-minimal sshd\[16536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.185.214.123
2019-11-24 04:48:03
207.154.211.36 attackspam
Nov 23 22:53:57 server sshd\[25700\]: Invalid user yoyo from 207.154.211.36
Nov 23 22:53:57 server sshd\[25700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.211.36 
Nov 23 22:53:59 server sshd\[25700\]: Failed password for invalid user yoyo from 207.154.211.36 port 41070 ssh2
Nov 23 23:26:55 server sshd\[2112\]: Invalid user foo from 207.154.211.36
Nov 23 23:26:55 server sshd\[2112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.211.36 
...
2019-11-24 04:50:21
61.92.14.168 attackspambots
SSH brutforce
2019-11-24 05:18:30
202.137.134.108 attackbots
Nov 23 15:08:32 mail postfix/smtpd[6183]: warning: unknown[202.137.134.108]: SASL PLAIN authentication failed: 
Nov 23 15:16:33 mail postfix/smtpd[6751]: warning: unknown[202.137.134.108]: SASL PLAIN authentication failed: 
Nov 23 15:18:07 mail postfix/smtpd[6129]: warning: unknown[202.137.134.108]: SASL PLAIN authentication failed:
2019-11-24 05:07:03
119.185.233.2 attackbots
badbot
2019-11-24 04:57:29
54.37.253.121 attackbotsspam
11/23/2019-15:08:15.849445 54.37.253.121 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-24 05:00:02
178.176.60.196 attackspambots
Invalid user langen from 178.176.60.196 port 39406
2019-11-24 05:21:04
106.12.86.205 attackbots
Nov 23 15:30:57 ny01 sshd[17026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.86.205
Nov 23 15:30:59 ny01 sshd[17026]: Failed password for invalid user test from 106.12.86.205 port 40098 ssh2
Nov 23 15:38:27 ny01 sshd[17656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.86.205
2019-11-24 05:01:25
187.191.60.178 attackspam
Nov 23 11:54:37 ws19vmsma01 sshd[171496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.191.60.178
Nov 23 11:54:39 ws19vmsma01 sshd[171496]: Failed password for invalid user admin from 187.191.60.178 port 38208 ssh2
...
2019-11-24 04:55:59
177.92.183.35 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-11-24 05:11:01
91.121.84.36 attack
FTP Brute-Force reported by Fail2Ban
2019-11-24 04:51:33

Recently Reported IPs

153.207.221.249 109.243.179.81 166.226.193.160 90.73.197.11
226.177.13.36 21.49.142.120 251.240.181.191 128.83.84.27
138.144.212.38 25.88.83.61 55.80.161.41 160.72.241.13
254.79.152.95 108.229.30.48 8.74.133.104 246.128.61.245
210.224.25.236 44.173.136.145 4.121.196.180 35.236.100.200