Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Istanbul

Region: Istanbul

Country: Turkey

Internet Service Provider: Vodafone

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.140.218.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3732
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.140.218.75.			IN	A

;; AUTHORITY SECTION:
.			339	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023042800 1800 900 604800 86400

;; Query time: 82 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 28 18:47:10 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 75.218.140.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 75.218.140.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.172 attack
Aug 23 15:19:54 ip-172-31-61-156 sshd[31841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.172  user=root
Aug 23 15:19:56 ip-172-31-61-156 sshd[31841]: Failed password for root from 112.85.42.172 port 53029 ssh2
...
2020-08-23 23:23:54
201.236.182.92 attack
Aug 23 15:26:09 rancher-0 sshd[1233701]: Invalid user tomcat from 201.236.182.92 port 54302
...
2020-08-23 23:27:37
129.204.42.144 attackspam
$f2bV_matches
2020-08-23 23:10:25
98.143.148.45 attack
Aug 23 16:52:17 MainVPS sshd[23245]: Invalid user falko from 98.143.148.45 port 42196
Aug 23 16:52:17 MainVPS sshd[23245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.143.148.45
Aug 23 16:52:17 MainVPS sshd[23245]: Invalid user falko from 98.143.148.45 port 42196
Aug 23 16:52:20 MainVPS sshd[23245]: Failed password for invalid user falko from 98.143.148.45 port 42196 ssh2
Aug 23 16:55:45 MainVPS sshd[29347]: Invalid user deploy from 98.143.148.45 port 58700
...
2020-08-23 23:00:13
194.36.108.6 attack
0,47-13/10 [bc01/m19] PostRequest-Spammer scoring: zurich
2020-08-23 23:13:03
211.80.102.186 attack
Aug 23 14:57:40 h2779839 sshd[30223]: Invalid user caio from 211.80.102.186 port 31011
Aug 23 14:57:40 h2779839 sshd[30223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.80.102.186
Aug 23 14:57:40 h2779839 sshd[30223]: Invalid user caio from 211.80.102.186 port 31011
Aug 23 14:57:42 h2779839 sshd[30223]: Failed password for invalid user caio from 211.80.102.186 port 31011 ssh2
Aug 23 15:02:11 h2779839 sshd[30314]: Invalid user admin from 211.80.102.186 port 56778
Aug 23 15:02:11 h2779839 sshd[30314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.80.102.186
Aug 23 15:02:11 h2779839 sshd[30314]: Invalid user admin from 211.80.102.186 port 56778
Aug 23 15:02:14 h2779839 sshd[30314]: Failed password for invalid user admin from 211.80.102.186 port 56778 ssh2
Aug 23 15:06:31 h2779839 sshd[30374]: Invalid user tibo from 211.80.102.186 port 19550
...
2020-08-23 23:04:43
112.85.42.200 attackspam
2020-08-23T17:17:33.805414galaxy.wi.uni-potsdam.de sshd[19691]: Failed password for root from 112.85.42.200 port 49592 ssh2
2020-08-23T17:17:37.085282galaxy.wi.uni-potsdam.de sshd[19691]: Failed password for root from 112.85.42.200 port 49592 ssh2
2020-08-23T17:17:40.436155galaxy.wi.uni-potsdam.de sshd[19691]: Failed password for root from 112.85.42.200 port 49592 ssh2
2020-08-23T17:17:44.201249galaxy.wi.uni-potsdam.de sshd[19691]: Failed password for root from 112.85.42.200 port 49592 ssh2
2020-08-23T17:17:44.201428galaxy.wi.uni-potsdam.de sshd[19691]: error: maximum authentication attempts exceeded for root from 112.85.42.200 port 49592 ssh2 [preauth]
2020-08-23T17:17:44.201457galaxy.wi.uni-potsdam.de sshd[19691]: Disconnecting: Too many authentication failures [preauth]
2020-08-23T17:17:55.232666galaxy.wi.uni-potsdam.de sshd[19756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.200  user=root
2020-08-23T17:17:57.952232galaxy.wi.uni
...
2020-08-23 23:22:40
34.92.70.232 attackspambots
Aug 23 14:57:17 vlre-nyc-1 sshd\[27133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.92.70.232  user=root
Aug 23 14:57:19 vlre-nyc-1 sshd\[27133\]: Failed password for root from 34.92.70.232 port 60404 ssh2
Aug 23 14:57:52 vlre-nyc-1 sshd\[27151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.92.70.232  user=root
Aug 23 14:57:53 vlre-nyc-1 sshd\[27151\]: Failed password for root from 34.92.70.232 port 40036 ssh2
Aug 23 14:58:41 vlre-nyc-1 sshd\[27181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.92.70.232  user=root
...
2020-08-23 23:11:43
14.23.81.42 attackbots
Aug 23 15:20:54 abendstille sshd\[9395\]: Invalid user bot from 14.23.81.42
Aug 23 15:20:54 abendstille sshd\[9395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.23.81.42
Aug 23 15:20:56 abendstille sshd\[9395\]: Failed password for invalid user bot from 14.23.81.42 port 39534 ssh2
Aug 23 15:26:26 abendstille sshd\[14788\]: Invalid user ravi from 14.23.81.42
Aug 23 15:26:26 abendstille sshd\[14788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.23.81.42
...
2020-08-23 23:20:39
103.74.239.110 attack
Aug 23 19:54:08 webhost01 sshd[1652]: Failed password for root from 103.74.239.110 port 47808 ssh2
...
2020-08-23 23:20:53
167.172.238.159 attack
2020-08-23T13:52:53.485820shield sshd\[3050\]: Invalid user xxl from 167.172.238.159 port 41442
2020-08-23T13:52:53.493732shield sshd\[3050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.238.159
2020-08-23T13:52:55.461900shield sshd\[3050\]: Failed password for invalid user xxl from 167.172.238.159 port 41442 ssh2
2020-08-23T13:56:57.092997shield sshd\[3949\]: Invalid user janu from 167.172.238.159 port 50172
2020-08-23T13:56:57.128156shield sshd\[3949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.238.159
2020-08-23 22:57:43
192.243.117.143 attack
Brute-force attempt banned
2020-08-23 23:07:01
91.132.147.168 attackbots
2020-08-23T10:08:26.485870morrigan.ad5gb.com sshd[3341776]: Failed password for root from 91.132.147.168 port 54284 ssh2
2020-08-23T10:08:29.525178morrigan.ad5gb.com sshd[3341776]: Failed password for root from 91.132.147.168 port 54284 ssh2
2020-08-23 23:12:31
193.239.147.38 attackspambots
 TCP (SYN) 193.239.147.38:38699 -> port 81, len 44
2020-08-23 23:13:51
92.34.176.84 attackbots
Aug 23 14:04:36 www sshd[11385]: Failed password for r.r from 92.34.176.84 port 51875 ssh2
Aug 23 14:04:37 www sshd[11385]: Connection closed by 92.34.176.84 [preauth]
Aug 23 14:04:38 www sshd[11395]: Invalid user ubuntu from 92.34.176.84
Aug 23 14:04:39 www sshd[11395]: Failed password for invalid user ubuntu from 92.34.176.84 port 51911 ssh2
Aug 23 14:04:39 www sshd[11395]: Connection closed by 92.34.176.84 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=92.34.176.84
2020-08-23 23:26:58

Recently Reported IPs

245.198.232.160 8.148.0.55 238.225.227.108 69.202.193.87
56.70.203.107 191.39.141.63 15.157.210.166 34.14.188.0
57.202.106.93 149.22.104.155 114.194.254.111 184.10.35.229
132.206.56.60 183.50.205.133 209.10.6.64 201.87.7.254
209.161.119.165 83.100.27.16 105.185.60.62 178.156.202.222