Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
149.129.50.37 attack
"GET http://www.proxylists.net/proxyjudge.php HTTP/1.1"  "-" "Mozilla/3.0 (X11; I; OSF1 V4.0 alpha)"
"CONNECT ext.baidu.com:443 HTTP/1.1"  "-" "-"
2020-07-06 08:40:04
149.129.50.30 attackbotsspam
Apr 29 12:07:23 olgosrv01 sshd[15671]: Invalid user acs from 149.129.50.30
Apr 29 12:07:23 olgosrv01 sshd[15671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.50.30 
Apr 29 12:07:25 olgosrv01 sshd[15671]: Failed password for invalid user acs from 149.129.50.30 port 53396 ssh2
Apr 29 12:07:25 olgosrv01 sshd[15671]: Received disconnect from 149.129.50.30: 11: Bye Bye [preauth]
Apr 29 12:11:55 olgosrv01 sshd[16103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.50.30  user=r.r
Apr 29 12:11:57 olgosrv01 sshd[16103]: Failed password for r.r from 149.129.50.30 port 53352 ssh2
Apr 29 12:11:57 olgosrv01 sshd[16103]: Received disconnect from 149.129.50.30: 11: Bye Bye [preauth]
Apr 29 12:14:50 olgosrv01 sshd[16291]: Invalid user srvadmin from 149.129.50.30
Apr 29 12:14:50 olgosrv01 sshd[16291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhos........
-------------------------------
2020-04-29 21:03:12
149.129.50.37 attack
Unauthorized connection attempt detected from IP address 149.129.50.37 to port 80 [J]
2020-01-31 00:20:49
149.129.50.37 attackspam
Unauthorized connection attempt detected from IP address 149.129.50.37 to port 8080 [J]
2020-01-29 08:32:32
149.129.50.37 attackspam
" "
2019-11-28 18:47:42
149.129.50.37 attackspam
Fail2Ban Ban Triggered
2019-11-27 09:26:03
149.129.50.37 attack
Malformed \x.. web request
2019-11-09 20:37:00
149.129.50.37 attack
Unauthorised access (Jul  2) SRC=149.129.50.37 LEN=40 PREC=0x20 TTL=240 ID=54321 TCP DPT=8080 WINDOW=65535 SYN
2019-07-03 00:46:15
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.129.50.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19084
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.129.50.144.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 11:43:02 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 144.50.129.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 144.50.129.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.80.70.67 attackbots
Nov 23 18:53:21 ny01 sshd[6686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.70.67
Nov 23 18:53:23 ny01 sshd[6686]: Failed password for invalid user server from 45.80.70.67 port 51810 ssh2
Nov 23 18:59:47 ny01 sshd[7794]: Failed password for games from 45.80.70.67 port 59706 ssh2
2019-11-24 08:15:46
185.245.96.83 attackspambots
Nov 24 00:45:09 icinga sshd[30199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.245.96.83
Nov 24 00:45:11 icinga sshd[30199]: Failed password for invalid user 1qaz3edc5tgb from 185.245.96.83 port 47536 ssh2
...
2019-11-24 08:47:25
76.115.138.33 attack
2019-11-24T00:30:49.631009abusebot-8.cloudsearch.cf sshd\[20608\]: Invalid user nfs from 76.115.138.33 port 38864
2019-11-24 08:39:56
106.225.208.187 attack
REQUESTED PAGE: /scripts/setup.php
2019-11-24 08:27:18
185.143.221.55 attack
185.143.221.55 was recorded 30 times by 23 hosts attempting to connect to the following ports: 3391,3389,3390. Incident counter (4h, 24h, all-time): 30, 36, 977
2019-11-24 08:25:19
54.37.136.87 attackspambots
Nov 23 23:37:24 srv01 sshd[9553]: Invalid user guest from 54.37.136.87 port 56010
Nov 23 23:37:24 srv01 sshd[9553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.136.87
Nov 23 23:37:24 srv01 sshd[9553]: Invalid user guest from 54.37.136.87 port 56010
Nov 23 23:37:26 srv01 sshd[9553]: Failed password for invalid user guest from 54.37.136.87 port 56010 ssh2
Nov 23 23:43:27 srv01 sshd[10117]: Invalid user guest from 54.37.136.87 port 35026
...
2019-11-24 08:37:23
112.237.141.74 attack
badbot
2019-11-24 08:29:30
115.236.10.66 attack
Nov 24 00:24:51 lnxded63 sshd[30732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.236.10.66
2019-11-24 08:36:49
51.75.123.195 attackspam
Nov 23 14:10:52 hanapaa sshd\[23290\]: Invalid user topher from 51.75.123.195
Nov 23 14:10:52 hanapaa sshd\[23290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.ip-51-75-123.eu
Nov 23 14:10:55 hanapaa sshd\[23290\]: Failed password for invalid user topher from 51.75.123.195 port 36702 ssh2
Nov 23 14:17:11 hanapaa sshd\[23812\]: Invalid user test0000 from 51.75.123.195
Nov 23 14:17:11 hanapaa sshd\[23812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.ip-51-75-123.eu
2019-11-24 08:20:01
121.35.100.84 attack
badbot
2019-11-24 08:40:37
104.37.169.192 attack
2019-11-24T00:45:12.488089  sshd[32350]: Invalid user Ilmari from 104.37.169.192 port 57834
2019-11-24T00:45:12.502276  sshd[32350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.37.169.192
2019-11-24T00:45:12.488089  sshd[32350]: Invalid user Ilmari from 104.37.169.192 port 57834
2019-11-24T00:45:15.058993  sshd[32350]: Failed password for invalid user Ilmari from 104.37.169.192 port 57834 ssh2
2019-11-24T00:48:58.989568  sshd[32406]: Invalid user cisler from 104.37.169.192 port 48243
...
2019-11-24 08:41:43
164.132.110.223 attackbots
Nov 24 01:08:59 vps691689 sshd[31667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.110.223
Nov 24 01:09:01 vps691689 sshd[31667]: Failed password for invalid user hi19810Zax from 164.132.110.223 port 58389 ssh2
...
2019-11-24 08:26:25
141.98.80.101 attackspambots
Nov 24 01:29:03 mail postfix/smtpd[1429]: warning: unknown[141.98.80.101]: SASL PLAIN authentication failed: 
Nov 24 01:29:03 mail postfix/smtpd[32333]: warning: unknown[141.98.80.101]: SASL PLAIN authentication failed: 
Nov 24 01:29:09 mail postfix/smtpd[737]: warning: unknown[141.98.80.101]: SASL PLAIN authentication failed: 
Nov 24 01:29:09 mail postfix/smtpd[1443]: warning: unknown[141.98.80.101]: SASL PLAIN authentication failed:
2019-11-24 08:32:10
212.237.53.169 attackbotsspam
Invalid user wladyslaw from 212.237.53.169 port 53028
2019-11-24 08:30:03
80.211.79.117 attackspam
2019-11-24T00:23:01.048597shield sshd\[6765\]: Invalid user khami from 80.211.79.117 port 58212
2019-11-24T00:23:01.053834shield sshd\[6765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.79.117
2019-11-24T00:23:02.771880shield sshd\[6765\]: Failed password for invalid user khami from 80.211.79.117 port 58212 ssh2
2019-11-24T00:29:07.761849shield sshd\[8656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.79.117  user=root
2019-11-24T00:29:10.393018shield sshd\[8656\]: Failed password for root from 80.211.79.117 port 37272 ssh2
2019-11-24 08:46:57

Recently Reported IPs

17.202.141.38 127.28.224.216 175.225.175.152 187.88.100.235
176.123.85.249 222.129.29.100 171.90.160.2 99.36.144.211
142.74.115.247 252.255.5.45 216.185.84.128 144.150.214.54
107.231.239.140 88.73.91.224 243.244.17.95 67.232.110.6
21.144.91.251 212.18.49.158 211.230.188.185 239.63.91.200