Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.124.40.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8320
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.124.40.112.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 22:11:38 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 112.40.124.149.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 112.40.124.149.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
104.248.237.238 attackbots
Mar 26 14:43:54 nextcloud sshd\[1200\]: Invalid user tamara from 104.248.237.238
Mar 26 14:43:54 nextcloud sshd\[1200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.237.238
Mar 26 14:43:56 nextcloud sshd\[1200\]: Failed password for invalid user tamara from 104.248.237.238 port 39356 ssh2
2020-03-26 22:34:07
110.53.234.32 attackspambots
ICMP MH Probe, Scan /Distributed -
2020-03-26 22:31:02
80.82.64.110 attackbots
Mar 26 14:03:53 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=80.82.64.110, lip=192.168.100.101, session=\\
Mar 26 14:22:01 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=80.82.64.110, lip=192.168.100.101, session=\\
Mar 26 14:36:54 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=80.82.64.110, lip=192.168.100.101, session=\\
Mar 26 14:45:32 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=80.82.64.110, lip=192.168.100.101, session=\\
Mar 26 14:57:17 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=80.82.64.110, lip=192.168.100.101, session=\<1VjAXMKhaABQUkBu\>\
Mar 26 14:58:29 pop3-login: I
2020-03-26 22:58:15
106.12.216.15 attackbotsspam
fail2ban
2020-03-26 22:38:22
128.199.168.246 attackbots
Mar 25 19:17:35 nbi-636 sshd[23999]: Invalid user vmail from 128.199.168.246 port 29973
Mar 25 19:17:35 nbi-636 sshd[23999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.168.246 
Mar 25 19:17:37 nbi-636 sshd[23999]: Failed password for invalid user vmail from 128.199.168.246 port 29973 ssh2
Mar 25 19:17:37 nbi-636 sshd[23999]: Received disconnect from 128.199.168.246 port 29973:11: Bye Bye [preauth]
Mar 25 19:17:37 nbi-636 sshd[23999]: Disconnected from invalid user vmail 128.199.168.246 port 29973 [preauth]
Mar 25 19:19:04 nbi-636 sshd[24503]: Invalid user wm from 128.199.168.246 port 53047
Mar 25 19:19:04 nbi-636 sshd[24503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.168.246 
Mar 25 19:19:06 nbi-636 sshd[24503]: Failed password for invalid user wm from 128.199.168.246 port 53047 ssh2
Mar 25 19:19:08 nbi-636 sshd[24503]: Received disconnect from 128.199.168.246 port........
-------------------------------
2020-03-26 23:21:07
51.91.102.173 attackspambots
Mar 26 13:47:20 *** sshd[18714]: Invalid user david from 51.91.102.173
2020-03-26 22:46:05
222.142.144.116 attackbots
Telnetd brute force attack detected by fail2ban
2020-03-26 22:48:52
185.151.242.185 attack
Fail2Ban Ban Triggered
2020-03-26 23:27:07
45.125.65.35 attack
Mar 26 16:13:40 srv01 postfix/smtpd\[23503\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 26 16:14:49 srv01 postfix/smtpd\[23503\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 26 16:15:05 srv01 postfix/smtpd\[23503\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 26 16:15:12 srv01 postfix/smtpd\[32180\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 26 16:22:36 srv01 postfix/smtpd\[23503\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-03-26 23:25:17
114.67.81.251 attackbots
Mar 26 14:30:50 sd-53420 sshd\[20886\]: Invalid user ernste from 114.67.81.251
Mar 26 14:30:50 sd-53420 sshd\[20886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.81.251
Mar 26 14:30:52 sd-53420 sshd\[20886\]: Failed password for invalid user ernste from 114.67.81.251 port 57794 ssh2
Mar 26 14:35:08 sd-53420 sshd\[22213\]: Invalid user creola from 114.67.81.251
Mar 26 14:35:08 sd-53420 sshd\[22213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.81.251
...
2020-03-26 22:55:22
110.53.234.240 attack
ICMP MH Probe, Scan /Distributed -
2020-03-26 23:00:23
175.24.59.74 attackbots
Mar 26 14:01:54 localhost sshd\[18798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.59.74  user=uucp
Mar 26 14:01:55 localhost sshd\[18798\]: Failed password for uucp from 175.24.59.74 port 42712 ssh2
Mar 26 14:07:17 localhost sshd\[19325\]: Invalid user myky from 175.24.59.74
Mar 26 14:07:17 localhost sshd\[19325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.59.74
Mar 26 14:07:19 localhost sshd\[19325\]: Failed password for invalid user myky from 175.24.59.74 port 49054 ssh2
...
2020-03-26 23:24:07
138.68.93.14 attackspam
$f2bV_matches
2020-03-26 22:35:56
198.108.66.232 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2020-03-26 23:14:26
115.159.196.214 attack
no
2020-03-26 22:37:56

Recently Reported IPs

206.244.160.59 250.145.205.9 247.211.186.8 54.76.2.2
217.16.93.156 24.56.179.86 249.103.115.200 26.106.186.0
237.213.236.1 28.136.179.57 145.247.6.189 75.84.206.43
172.226.179.149 108.116.85.169 71.155.42.197 33.62.75.188
211.9.167.72 212.31.184.151 205.224.5.142 143.170.55.117