Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.139.142.170
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61122
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.139.142.170.		IN	A

;; AUTHORITY SECTION:
.			195	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024052401 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 25 04:38:30 CST 2024
;; MSG SIZE  rcvd: 108
Host info
Host 170.142.139.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 170.142.139.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.42.7 attackspambots
23.08.2020 13:33:11 SSH access blocked by firewall
2020-08-23 21:37:24
121.122.119.89 attack
Aug 22 06:23:42 online-web-vs-1 sshd[248854]: Invalid user r from 121.122.119.89 port 58736
Aug 22 06:23:42 online-web-vs-1 sshd[248854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.122.119.89
Aug 22 06:23:44 online-web-vs-1 sshd[248854]: Failed password for invalid user r from 121.122.119.89 port 58736 ssh2
Aug 22 06:23:44 online-web-vs-1 sshd[248854]: Received disconnect from 121.122.119.89 port 58736:11: Bye Bye [preauth]
Aug 22 06:23:44 online-web-vs-1 sshd[248854]: Disconnected from 121.122.119.89 port 58736 [preauth]
Aug 22 06:26:56 online-web-vs-1 sshd[248993]: Invalid user ghostname from 121.122.119.89 port 53040
Aug 22 06:26:56 online-web-vs-1 sshd[248993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.122.119.89
Aug 22 06:26:58 online-web-vs-1 sshd[248993]: Failed password for invalid user ghostname from 121.122.119.89 port 53040 ssh2
Aug 22 06:26:59 online-web-vs-1 s........
-------------------------------
2020-08-23 21:47:53
119.45.55.249 attackspambots
Aug 23 14:24:55 marvibiene sshd[3877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.55.249 
Aug 23 14:24:57 marvibiene sshd[3877]: Failed password for invalid user damian from 119.45.55.249 port 52590 ssh2
2020-08-23 21:13:30
222.186.173.215 attackbots
Aug 23 06:38:21 dignus sshd[14260]: Failed password for root from 222.186.173.215 port 43028 ssh2
Aug 23 06:38:25 dignus sshd[14260]: Failed password for root from 222.186.173.215 port 43028 ssh2
Aug 23 06:38:29 dignus sshd[14260]: Failed password for root from 222.186.173.215 port 43028 ssh2
Aug 23 06:38:31 dignus sshd[14260]: Failed password for root from 222.186.173.215 port 43028 ssh2
Aug 23 06:38:35 dignus sshd[14260]: Failed password for root from 222.186.173.215 port 43028 ssh2
...
2020-08-23 21:42:32
112.85.42.173 attack
Aug 23 15:37:44 santamaria sshd\[29359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
Aug 23 15:37:46 santamaria sshd\[29359\]: Failed password for root from 112.85.42.173 port 32755 ssh2
Aug 23 15:37:49 santamaria sshd\[29359\]: Failed password for root from 112.85.42.173 port 32755 ssh2
...
2020-08-23 21:48:10
152.231.93.130 attackbots
Aug 23 13:33:29 124388 sshd[1532]: Invalid user odoo11 from 152.231.93.130 port 4938
Aug 23 13:33:30 124388 sshd[1532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.231.93.130
Aug 23 13:33:29 124388 sshd[1532]: Invalid user odoo11 from 152.231.93.130 port 4938
Aug 23 13:33:32 124388 sshd[1532]: Failed password for invalid user odoo11 from 152.231.93.130 port 4938 ssh2
Aug 23 13:36:00 124388 sshd[1633]: Invalid user sharon from 152.231.93.130 port 47800
2020-08-23 21:50:41
222.186.30.57 attackspambots
Aug 23 13:12:50 rush sshd[5430]: Failed password for root from 222.186.30.57 port 13822 ssh2
Aug 23 13:12:53 rush sshd[5430]: Failed password for root from 222.186.30.57 port 13822 ssh2
Aug 23 13:12:55 rush sshd[5430]: Failed password for root from 222.186.30.57 port 13822 ssh2
...
2020-08-23 21:16:32
83.97.20.165 attackbots
Fail2Ban Ban Triggered
2020-08-23 21:39:03
51.83.125.8 attackspam
SSH
2020-08-23 21:43:49
8.211.45.4 attackbots
Aug 23 15:02:00 vps639187 sshd\[9469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.211.45.4  user=root
Aug 23 15:02:03 vps639187 sshd\[9469\]: Failed password for root from 8.211.45.4 port 44142 ssh2
Aug 23 15:05:32 vps639187 sshd\[9581\]: Invalid user vyos from 8.211.45.4 port 51704
Aug 23 15:05:32 vps639187 sshd\[9581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.211.45.4
...
2020-08-23 21:32:46
51.77.201.36 attackspam
$f2bV_matches
2020-08-23 21:24:28
64.202.184.249 attackbots
64.202.184.249 - - [23/Aug/2020:13:24:41 +0100] "POST /wp-login.php HTTP/1.1" 200 2046 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
64.202.184.249 - - [23/Aug/2020:13:24:42 +0100] "POST /wp-login.php HTTP/1.1" 200 2020 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
64.202.184.249 - - [23/Aug/2020:13:24:44 +0100] "POST /wp-login.php HTTP/1.1" 200 2019 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-23 21:23:49
81.68.127.249 attack
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-08-23 21:51:04
51.83.33.202 attackbotsspam
Aug 23 13:08:58 game-panel sshd[14722]: Failed password for root from 51.83.33.202 port 36262 ssh2
Aug 23 13:15:05 game-panel sshd[15148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.33.202
Aug 23 13:15:06 game-panel sshd[15148]: Failed password for invalid user miusuario from 51.83.33.202 port 34264 ssh2
2020-08-23 21:22:02
222.186.180.130 attackspam
Aug 23 13:28:22 scw-6657dc sshd[24552]: Failed password for root from 222.186.180.130 port 20774 ssh2
Aug 23 13:28:22 scw-6657dc sshd[24552]: Failed password for root from 222.186.180.130 port 20774 ssh2
Aug 23 13:28:24 scw-6657dc sshd[24552]: Failed password for root from 222.186.180.130 port 20774 ssh2
...
2020-08-23 21:29:40

Recently Reported IPs

59.158.167.214 115.75.42.36 154.59.168.165 227.80.109.213
199.14.175.100 232.197.231.78 141.21.248.144 39.66.70.242
223.55.72.237 136.205.216.57 143.156.207.182 29.170.134.159
135.175.105.126 42.245.159.71 185.112.119.245 66.26.67.81
156.109.154.133 247.33.254.182 119.91.44.27 104.111.34.205