Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.131.49.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29530
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.131.49.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 07:18:42 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 149.49.131.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.49.131.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.210.42.209 attack
Nov 10 16:48:40 Ubuntu-1404-trusty-64-minimal sshd\[6346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.42.209  user=root
Nov 10 16:48:42 Ubuntu-1404-trusty-64-minimal sshd\[6346\]: Failed password for root from 190.210.42.209 port 3479 ssh2
Nov 10 17:04:49 Ubuntu-1404-trusty-64-minimal sshd\[23445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.42.209  user=root
Nov 10 17:04:51 Ubuntu-1404-trusty-64-minimal sshd\[23445\]: Failed password for root from 190.210.42.209 port 55013 ssh2
Nov 10 17:09:19 Ubuntu-1404-trusty-64-minimal sshd\[25305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.42.209  user=root
2019-11-11 01:11:05
213.147.183.1 attackbots
Nov 10 19:08:56 server sshd\[18004\]: Invalid user pi from 213.147.183.1
Nov 10 19:08:56 server sshd\[18006\]: Invalid user pi from 213.147.183.1
Nov 10 19:08:57 server sshd\[18004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213-147-183-1.hdsl.highway.telekom.at 
Nov 10 19:08:57 server sshd\[18006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213-147-183-1.hdsl.highway.telekom.at 
Nov 10 19:08:59 server sshd\[18004\]: Failed password for invalid user pi from 213.147.183.1 port 58824 ssh2
...
2019-11-11 01:24:48
120.92.153.47 attackspambots
2019-11-10 20:13:36 dovecot_login authenticator failed for (95.216.208.141) [120.92.153.47]: 535 Incorrect authentication data (set_id=nologin)
2019-11-10 20:13:53 dovecot_login authenticator failed for (95.216.208.141) [120.92.153.47]: 535 Incorrect authentication data (set_id=joe)
...
2019-11-11 01:32:11
118.91.255.14 attack
2019-11-10T16:52:49.019175shield sshd\[22513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.91.255.14  user=root
2019-11-10T16:52:50.526731shield sshd\[22513\]: Failed password for root from 118.91.255.14 port 42348 ssh2
2019-11-10T16:56:59.744118shield sshd\[23163\]: Invalid user smackdown from 118.91.255.14 port 51610
2019-11-10T16:56:59.750093shield sshd\[23163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.91.255.14
2019-11-10T16:57:02.050211shield sshd\[23163\]: Failed password for invalid user smackdown from 118.91.255.14 port 51610 ssh2
2019-11-11 01:04:47
149.202.65.173 attackbotsspam
Nov 10 23:00:25 vibhu-HP-Z238-Microtower-Workstation sshd\[778\]: Invalid user itah from 149.202.65.173
Nov 10 23:00:25 vibhu-HP-Z238-Microtower-Workstation sshd\[778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.65.173
Nov 10 23:00:27 vibhu-HP-Z238-Microtower-Workstation sshd\[778\]: Failed password for invalid user itah from 149.202.65.173 port 35640 ssh2
Nov 10 23:03:52 vibhu-HP-Z238-Microtower-Workstation sshd\[1022\]: Invalid user y from 149.202.65.173
Nov 10 23:03:52 vibhu-HP-Z238-Microtower-Workstation sshd\[1022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.65.173
...
2019-11-11 01:37:26
134.209.89.101 attackbotsspam
LGS,WP GET /wp-login.php
GET /wp-login.php
2019-11-11 00:57:23
46.101.105.55 attack
ssh failed login
2019-11-11 01:31:16
49.235.88.96 attackspam
Nov 10 18:47:32 server sshd\[12346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.88.96  user=root
Nov 10 18:47:33 server sshd\[12346\]: Failed password for root from 49.235.88.96 port 53546 ssh2
Nov 10 19:09:14 server sshd\[18070\]: Invalid user jeonyeob from 49.235.88.96
Nov 10 19:09:14 server sshd\[18070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.88.96 
Nov 10 19:09:16 server sshd\[18070\]: Failed password for invalid user jeonyeob from 49.235.88.96 port 38558 ssh2
...
2019-11-11 01:14:23
187.73.210.140 attack
Nov 10 17:32:55 localhost sshd\[18250\]: Invalid user fras from 187.73.210.140 port 58244
Nov 10 17:32:55 localhost sshd\[18250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.73.210.140
Nov 10 17:32:57 localhost sshd\[18250\]: Failed password for invalid user fras from 187.73.210.140 port 58244 ssh2
2019-11-11 00:53:17
125.88.177.12 attack
$f2bV_matches
2019-11-11 01:05:14
185.70.186.198 attackspam
" "
2019-11-11 01:26:09
91.121.211.59 attackbotsspam
Nov 10 11:46:53 plusreed sshd[22338]: Invalid user master from 91.121.211.59
...
2019-11-11 00:58:38
83.20.191.207 attack
Automatic report - Port Scan Attack
2019-11-11 01:13:32
173.82.240.209 attack
" "
2019-11-11 01:21:56
107.170.244.110 attackbots
Nov 10 17:05:37 root sshd[6915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.244.110 
Nov 10 17:05:38 root sshd[6915]: Failed password for invalid user packer from 107.170.244.110 port 52108 ssh2
Nov 10 17:09:16 root sshd[7001]: Failed password for root from 107.170.244.110 port 33212 ssh2
...
2019-11-11 01:14:50

Recently Reported IPs

193.226.219.132 187.37.148.173 199.33.1.166 247.235.156.142
173.189.192.255 69.24.98.27 130.13.113.145 40.46.248.252
193.24.11.237 233.235.3.226 191.151.69.188 85.87.88.92
174.45.67.248 165.181.104.25 81.210.253.253 12.81.101.184
173.24.62.84 225.242.153.101 64.102.138.4 214.200.248.254