Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.148.80.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37263
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.148.80.9.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 18:43:44 CST 2025
;; MSG SIZE  rcvd: 105
Host info
9.80.148.149.in-addr.arpa domain name pointer desktop-2fg7ncn.strahlen.meduniwien.ac.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
9.80.148.149.in-addr.arpa	name = desktop-2fg7ncn.strahlen.meduniwien.ac.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
74.82.47.4 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-26 06:53:39,552 INFO [amun_request_handler] unknown vuln (Attacker: 74.82.47.4 Port: 3389, Mess: ['\x16\x03\x01\x00\x9a\x01\x00\x00\x96\x03\x03]0f\x1f\xe9\xd7\xbbD{x\xa4\xf9\xed\xfc\xbc\xf8\x04\xd3a\xe6h\xf8e:\xfb\xdd.^\x16~\x8df\x00\x00\x1a\xc0/\xc0 \xc0\x11\xc0\x07\xc0\x13\xc0\t\xc0\x14\xc0\n\x00\x05\x00/\x005\xc0\x12\x00\n\x01\x00\x00S\x00\x05\x00\x05\x01\x00\x00\x00\x00\x00\n\x00\x08\x00\x06\x00\x17\x00\x18\x00\x19\x00\x0b\x00\x02\x01\x00\x00\r\x00
2019-06-26 21:08:11
202.186.197.122 attackspam
" "
2019-06-26 21:11:15
188.166.232.14 attackspambots
Triggered by Fail2Ban at Vostok web server
2019-06-26 21:16:10
51.75.248.164 attackspambots
Triggered by Fail2Ban
2019-06-26 21:03:39
137.74.146.53 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-06-26 21:36:50
181.66.232.121 attack
port scan and connect, tcp 23 (telnet)
2019-06-26 21:27:10
222.184.67.249 attackbotsspam
2019-06-26T05:39:53.611640mail.arvenenaske.de sshd[23470]: Invalid user admin from 222.184.67.249 port 50010
2019-06-26T05:39:53.617862mail.arvenenaske.de sshd[23470]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.184.67.249 user=admin
2019-06-26T05:39:53.618801mail.arvenenaske.de sshd[23470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.184.67.249
2019-06-26T05:39:53.611640mail.arvenenaske.de sshd[23470]: Invalid user admin from 222.184.67.249 port 50010
2019-06-26T05:39:55.092219mail.arvenenaske.de sshd[23470]: Failed password for invalid user admin from 222.184.67.249 port 50010 ssh2
2019-06-26T05:39:55.436641mail.arvenenaske.de sshd[23470]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.184.67.249 user=admin
2019-06-26T05:39:53.617862mail.arvenenaske.de sshd[23470]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tt........
------------------------------
2019-06-26 21:13:39
36.89.48.90 attackbots
Unauthorized connection attempt from IP address 36.89.48.90 on Port 445(SMB)
2019-06-26 21:32:19
113.58.45.148 attack
Scanning and Vuln Attempts
2019-06-26 20:59:01
111.90.144.30 attackspambots
proto=tcp  .  spt=45106  .  dpt=25  .     (listed on Blocklist de  Jun 25)     (702)
2019-06-26 21:14:11
178.128.201.224 attack
$f2bV_matches
2019-06-26 21:20:35
177.91.117.190 attackspam
SMTP-sasl brute force
...
2019-06-26 21:16:47
125.113.130.31 attackbotsspam
445/tcp
[2019-06-26]1pkt
2019-06-26 21:05:55
212.83.183.155 attack
Invalid user admin from 212.83.183.155 port 35425
2019-06-26 20:57:54
95.58.194.143 attack
SSH-BRUTEFORCE
2019-06-26 21:25:20

Recently Reported IPs

7.34.153.120 188.26.178.19 91.168.106.78 132.81.127.62
198.38.65.133 3.218.21.155 30.203.167.195 87.79.161.163
81.239.155.214 207.122.44.160 127.85.173.87 90.139.211.202
121.160.125.151 17.169.199.48 89.156.208.31 189.50.234.84
16.193.205.114 184.246.123.70 104.169.216.170 215.136.93.180