Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.126.6.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24262
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.126.6.108.			IN	A

;; AUTHORITY SECTION:
.			400	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 04:33:21 CST 2022
;; MSG SIZE  rcvd: 106
Host info
108.6.126.149.in-addr.arpa domain name pointer vsa-sexizo.cyon.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
108.6.126.149.in-addr.arpa	name = vsa-sexizo.cyon.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.215.197.210 attackspam
Unauthorized connection attempt detected from IP address 104.215.197.210 to port 2220 [J]
2020-01-16 21:03:38
181.30.28.247 attack
Jan 16 13:17:31 vps58358 sshd\[29026\]: Invalid user user from 181.30.28.247Jan 16 13:17:32 vps58358 sshd\[29026\]: Failed password for invalid user user from 181.30.28.247 port 54456 ssh2Jan 16 13:21:39 vps58358 sshd\[29121\]: Invalid user jai from 181.30.28.247Jan 16 13:21:40 vps58358 sshd\[29121\]: Failed password for invalid user jai from 181.30.28.247 port 57952 ssh2Jan 16 13:25:50 vps58358 sshd\[29206\]: Invalid user cortez from 181.30.28.247Jan 16 13:25:52 vps58358 sshd\[29206\]: Failed password for invalid user cortez from 181.30.28.247 port 33216 ssh2
...
2020-01-16 21:08:42
83.167.28.131 attack
Unauthorized connection attempt detected from IP address 83.167.28.131 to port 2220 [J]
2020-01-16 21:32:20
42.112.203.142 attack
20/1/15@23:43:38: FAIL: Alarm-Network address from=42.112.203.142
20/1/15@23:43:38: FAIL: Alarm-Network address from=42.112.203.142
...
2020-01-16 20:55:33
175.174.97.35 attackbots
Unauthorised access (Jan 16) SRC=175.174.97.35 LEN=40 TTL=49 ID=25111 TCP DPT=23 WINDOW=12425 SYN
2020-01-16 21:27:22
110.7.43.223 attackbotsspam
Fail2Ban - FTP Abuse Attempt
2020-01-16 20:59:41
113.177.113.81 attackbotsspam
Unauthorized IMAP connection attempt
2020-01-16 21:16:43
202.100.183.157 attackspam
01/16/2020-14:05:11.166109 202.100.183.157 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-01-16 21:29:20
157.245.151.209 attack
Invalid user tomcat from 157.245.151.209 port 53780
2020-01-16 21:06:34
186.183.141.69 attackbots
Automatic report - Port Scan Attack
2020-01-16 21:26:50
51.77.108.248 attack
Unauthorized connection attempt detected from IP address 51.77.108.248 to port 2220 [J]
2020-01-16 21:25:13
144.34.253.93 attack
Unauthorized connection attempt detected from IP address 144.34.253.93 to port 2220 [J]
2020-01-16 21:30:15
37.70.217.215 attack
Jan 16 14:11:56 mout sshd[9515]: Invalid user cloud from 37.70.217.215 port 46654
2020-01-16 21:20:05
107.174.66.201 attackbots
Trying ports that it shouldn't be.
2020-01-16 20:54:25
194.182.73.80 attackspam
Unauthorized connection attempt detected from IP address 194.182.73.80 to port 2220 [J]
2020-01-16 21:29:43

Recently Reported IPs

149.126.4.101 149.126.4.27 149.126.4.86 149.115.19.114
149.126.6.166 149.154.100.81 149.154.64.42 149.154.69.210
149.154.159.195 149.154.69.111 149.154.70.90 149.154.65.102
149.154.71.21 149.13.77.64 149.154.71.222 149.20.163.21
149.202.102.178 149.202.106.34 149.202.115.72 149.202.108.176