Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.12.18.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9258
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.12.18.152.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020900 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 09 23:27:30 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 152.18.12.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 152.18.12.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.240.246.194 attackbots
Apr  3 22:47:34 ns3164893 sshd[2110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.240.246.194  user=root
Apr  3 22:47:35 ns3164893 sshd[2110]: Failed password for root from 106.240.246.194 port 59578 ssh2
...
2020-04-04 04:51:57
111.63.31.54 attackbots
Invalid user ff from 111.63.31.54 port 6531
2020-04-04 04:49:39
85.172.13.206 attackbots
Apr  3 21:29:48 host sshd[41702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.172.13.206  user=root
Apr  3 21:29:50 host sshd[41702]: Failed password for root from 85.172.13.206 port 57535 ssh2
...
2020-04-04 05:03:54
106.13.54.106 attackspambots
Apr  3 22:53:01 host01 sshd[10493]: Failed password for root from 106.13.54.106 port 24213 ssh2
Apr  3 22:55:18 host01 sshd[10922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.54.106 
Apr  3 22:55:20 host01 sshd[10922]: Failed password for invalid user user from 106.13.54.106 port 63033 ssh2
...
2020-04-04 04:56:25
51.77.194.232 attackbotsspam
Invalid user test from 51.77.194.232 port 39234
2020-04-04 05:12:08
106.12.150.36 attackspambots
Repeated brute force against a port
2020-04-04 04:56:50
51.75.248.241 attack
Repeated brute force against a port
2020-04-04 05:12:48
51.77.200.139 attackbotsspam
Tried sshing with brute force.
2020-04-04 05:11:49
139.87.193.152 attack
Invalid user postgres from 139.87.193.152 port 38874
2020-04-04 04:37:46
51.83.19.172 attackbots
Invalid user nwh from 51.83.19.172 port 44096
2020-04-04 05:11:37
106.13.128.64 attack
5x Failed Password
2020-04-04 04:55:38
52.224.69.165 attack
(sshd) Failed SSH login from 52.224.69.165 (US/United States/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  3 22:01:44 ubnt-55d23 sshd[24461]: Invalid user hiroyuki from 52.224.69.165 port 36649
Apr  3 22:01:46 ubnt-55d23 sshd[24461]: Failed password for invalid user hiroyuki from 52.224.69.165 port 36649 ssh2
2020-04-04 05:09:09
118.223.237.2 attack
Invalid user pvr from 118.223.237.2 port 46582
2020-04-04 04:45:10
111.40.217.92 attackspam
Apr  3 16:57:00 v22018086721571380 sshd[2249]: Failed password for invalid user lg from 111.40.217.92 port 33469 ssh2
2020-04-04 04:50:05
81.250.182.198 attackbots
Invalid user user from 81.250.182.198 port 48859
2020-04-04 05:04:22

Recently Reported IPs

93.23.33.72 215.128.167.33 221.187.87.61 249.237.153.7
159.53.113.159 129.255.134.130 155.39.221.16 96.149.122.150
230.87.218.122 58.159.111.203 94.120.3.93 36.236.163.7
131.168.15.63 19.246.171.185 59.15.159.87 188.135.39.236
169.153.100.162 156.134.149.202 67.22.182.215 228.202.20.69