Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Vienna

Region: Wien

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.148.71.181
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50185
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.148.71.181.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025032800 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 28 21:47:31 CST 2025
;; MSG SIZE  rcvd: 107
Host info
181.71.148.149.in-addr.arpa domain name pointer ip149-148-71-181.zmpbmt.meduniwien.ac.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
181.71.148.149.in-addr.arpa	name = ip149-148-71-181.zmpbmt.meduniwien.ac.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.103.28.242 attackspam
Unauthorized connection attempt from IP address 190.103.28.242 on Port 445(SMB)
2019-12-13 08:46:09
51.89.68.141 attackspambots
Invalid user yoyo from 51.89.68.141 port 43938
2019-12-13 08:15:30
173.161.242.220 attack
Dec 12 13:56:37 web9 sshd\[21290\]: Invalid user test from 173.161.242.220
Dec 12 13:56:37 web9 sshd\[21290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.161.242.220
Dec 12 13:56:39 web9 sshd\[21290\]: Failed password for invalid user test from 173.161.242.220 port 8496 ssh2
Dec 12 14:03:35 web9 sshd\[22414\]: Invalid user rpc from 173.161.242.220
Dec 12 14:03:35 web9 sshd\[22414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.161.242.220
2019-12-13 08:18:20
103.60.126.80 attackspam
Dec 13 01:31:18 jane sshd[11218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.60.126.80 
Dec 13 01:31:21 jane sshd[11218]: Failed password for invalid user mysql from 103.60.126.80 port 52216 ssh2
...
2019-12-13 08:35:47
103.51.160.80 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-13 08:49:48
45.55.177.170 attackbotsspam
Invalid user sohyama from 45.55.177.170 port 39018
2019-12-13 08:28:06
185.165.163.161 attack
Unauthorized connection attempt from IP address 185.165.163.161 on Port 445(SMB)
2019-12-13 08:49:00
189.202.238.252 attack
1576190787 - 12/12/2019 23:46:27 Host: 189.202.238.252/189.202.238.252 Port: 445 TCP Blocked
2019-12-13 08:37:52
181.221.192.113 attackspambots
Dec 12 14:10:28 sachi sshd\[24401\]: Invalid user 123 from 181.221.192.113
Dec 12 14:10:28 sachi sshd\[24401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.221.192.113
Dec 12 14:10:30 sachi sshd\[24401\]: Failed password for invalid user 123 from 181.221.192.113 port 40109 ssh2
Dec 12 14:19:04 sachi sshd\[25237\]: Invalid user Abcabc123 from 181.221.192.113
Dec 12 14:19:04 sachi sshd\[25237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.221.192.113
2019-12-13 08:28:32
27.79.216.110 attack
Unauthorized connection attempt from IP address 27.79.216.110 on Port 445(SMB)
2019-12-13 08:48:03
218.92.0.168 attackspam
Dec 12 21:34:45 firewall sshd[26045]: Failed password for root from 218.92.0.168 port 34728 ssh2
Dec 12 21:34:49 firewall sshd[26045]: Failed password for root from 218.92.0.168 port 34728 ssh2
Dec 12 21:34:52 firewall sshd[26045]: Failed password for root from 218.92.0.168 port 34728 ssh2
...
2019-12-13 08:36:41
148.70.96.124 attack
DATE:2019-12-12 23:56:38,IP:148.70.96.124,MATCHES:10,PORT:ssh
2019-12-13 08:44:38
106.12.185.54 attackspam
Dec 12 22:30:06 XXX sshd[2665]: Invalid user andro from 106.12.185.54 port 37828
2019-12-13 08:33:25
46.244.11.14 attackbotsspam
Dec 12 13:52:30 sachi sshd\[22512\]: Invalid user feihongkeji!@\# from 46.244.11.14
Dec 12 13:52:30 sachi sshd\[22512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.244.11.14
Dec 12 13:52:32 sachi sshd\[22512\]: Failed password for invalid user feihongkeji!@\# from 46.244.11.14 port 33193 ssh2
Dec 12 13:58:18 sachi sshd\[23093\]: Invalid user ffffff from 46.244.11.14
Dec 12 13:58:18 sachi sshd\[23093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.244.11.14
2019-12-13 08:32:20
45.249.111.40 attack
Dec 12 14:25:34 hanapaa sshd\[5586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.249.111.40  user=backup
Dec 12 14:25:36 hanapaa sshd\[5586\]: Failed password for backup from 45.249.111.40 port 42554 ssh2
Dec 12 14:32:45 hanapaa sshd\[6203\]: Invalid user pflughoeft from 45.249.111.40
Dec 12 14:32:45 hanapaa sshd\[6203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.249.111.40
Dec 12 14:32:47 hanapaa sshd\[6203\]: Failed password for invalid user pflughoeft from 45.249.111.40 port 51262 ssh2
2019-12-13 08:39:20

Recently Reported IPs

42.8.161.130 65.75.54.187 5.2.235.0 48.78.3.228
73.148.165.189 195.94.133.225 72.61.9.237 174.242.130.87
5.2.238.0 54.234.180.244 5.2.210.0 161.227.174.244
240.23.221.248 83.45.214.107 125.167.146.35 199.73.61.226
37.232.84.76 248.121.35.112 140.137.35.232 129.18.108.77