Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Milan

Region: Lombardy

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.132.83.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33276
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;149.132.83.216.			IN	A

;; AUTHORITY SECTION:
.			564	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020052302 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 24 08:20:53 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 216.83.132.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 216.83.132.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
134.209.53.244 attack
WordPress login Brute force / Web App Attack on client site.
2020-01-08 03:20:52
52.178.134.11 attackspambots
Unauthorized connection attempt detected from IP address 52.178.134.11 to port 2220 [J]
2020-01-08 03:34:00
152.250.147.235 attackspam
Unauthorised access (Jan  7) SRC=152.250.147.235 LEN=40 TTL=242 ID=34124 DF TCP DPT=8080 WINDOW=14600 SYN
2020-01-08 03:10:13
189.1.132.90 attackbots
20/1/7@09:36:10: FAIL: Alarm-Network address from=189.1.132.90
20/1/7@09:36:11: FAIL: Alarm-Network address from=189.1.132.90
...
2020-01-08 03:01:13
218.92.0.212 attackspam
Jan  7 20:20:16 vmd26974 sshd[22480]: Failed password for root from 218.92.0.212 port 62442 ssh2
Jan  7 20:20:30 vmd26974 sshd[22480]: Failed password for root from 218.92.0.212 port 62442 ssh2
Jan  7 20:20:30 vmd26974 sshd[22480]: error: maximum authentication attempts exceeded for root from 218.92.0.212 port 62442 ssh2 [preauth]
...
2020-01-08 03:24:06
222.186.175.150 attackbots
Jan  7 20:18:36 h2177944 sshd\[29862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
Jan  7 20:18:39 h2177944 sshd\[29862\]: Failed password for root from 222.186.175.150 port 58664 ssh2
Jan  7 20:18:42 h2177944 sshd\[29862\]: Failed password for root from 222.186.175.150 port 58664 ssh2
Jan  7 20:18:45 h2177944 sshd\[29862\]: Failed password for root from 222.186.175.150 port 58664 ssh2
...
2020-01-08 03:28:31
149.202.84.141 attackspambots
SIP registrations and call attempts
2020-01-08 03:35:17
106.13.226.146 attack
Unauthorized connection attempt detected from IP address 106.13.226.146 to port 2220 [J]
2020-01-08 03:23:21
218.92.0.191 attackspam
Jan  7 19:52:20 dcd-gentoo sshd[2451]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Jan  7 19:52:23 dcd-gentoo sshd[2451]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Jan  7 19:52:20 dcd-gentoo sshd[2451]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Jan  7 19:52:23 dcd-gentoo sshd[2451]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Jan  7 19:52:20 dcd-gentoo sshd[2451]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Jan  7 19:52:23 dcd-gentoo sshd[2451]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Jan  7 19:52:23 dcd-gentoo sshd[2451]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.191 port 27059 ssh2
...
2020-01-08 03:04:16
116.97.29.51 attack
winbox attack
2020-01-08 03:04:59
49.233.135.204 attackbotsspam
Unauthorized connection attempt detected from IP address 49.233.135.204 to port 2220 [J]
2020-01-08 03:14:54
92.118.38.39 attackbots
Jan  7 20:02:43 vmanager6029 postfix/smtpd\[5401\]: warning: unknown\[92.118.38.39\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan  7 20:03:15 vmanager6029 postfix/smtpd\[5379\]: warning: unknown\[92.118.38.39\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-01-08 03:07:10
145.102.6.55 attack
Port scan on 1 port(s): 53
2020-01-08 03:19:54
59.127.172.234 attack
Unauthorized connection attempt detected from IP address 59.127.172.234 to port 2220 [J]
2020-01-08 03:29:49
118.119.102.190 attack
3389BruteforceFW22
2020-01-08 02:59:47

Recently Reported IPs

79.163.127.45 188.202.14.180 75.205.169.59 88.153.255.83
181.74.33.232 69.89.117.103 221.209.8.71 97.30.148.158
219.78.73.43 14.20.53.164 80.97.70.105 58.150.195.198
119.117.152.238 147.194.120.60 201.203.100.36 90.244.106.180
87.104.32.135 119.240.225.100 67.49.86.149 166.172.12.255