Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Antigua and Barbuda

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
149.154.167.99 attackproxy
Vulnerability Scanner
2025-12-26 17:57:33
149.154.167.222 botsattack
Vulnerability Scanner
2025-09-05 12:58:26
149.154.167.151 attack
Scan port
2024-02-29 22:33:37
149.154.167.43 attack
Scan port
2024-02-22 16:29:12
149.154.167.223 attack
Scan port
2024-02-20 21:21:53
149.154.167.151 attack
Scan port
2024-02-08 22:32:49
149.154.167.222 attack
Scan port
2024-01-17 22:27:30
149.154.167.222 attack
Scan port
2024-01-10 16:27:06
149.154.167.223 attack
Scan port
2024-01-05 20:12:57
149.154.167.222 attack
Scan port
2023-12-27 22:26:48
149.154.167.223 attack
Scan port
2023-11-22 13:43:37
149.154.167.223 attack
Scan port
2023-10-25 13:02:54
149.154.167.50 attack
trying to access non-authorized port
2020-07-26 01:54:42
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.154.167.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42752
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.154.167.41.			IN	A

;; AUTHORITY SECTION:
.			357	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:35:11 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 41.167.154.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 41.167.154.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
36.65.68.229 attackspambots
SS1,DEF GET /admin/build/modules
2019-12-02 21:06:19
27.72.105.157 attack
fail2ban
2019-12-02 21:19:03
62.2.148.66 attack
2019-12-02T12:23:49.726830abusebot-3.cloudsearch.cf sshd\[28372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62-2-148-66.static.cablecom.ch  user=root
2019-12-02 20:59:54
218.92.0.157 attack
Dec  2 14:23:13 srv206 sshd[20098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.157  user=root
Dec  2 14:23:15 srv206 sshd[20098]: Failed password for root from 218.92.0.157 port 13031 ssh2
...
2019-12-02 21:24:31
117.252.0.162 attackspam
445/tcp
[2019-12-02]1pkt
2019-12-02 21:26:45
14.185.39.195 attack
445/tcp
[2019-12-02]1pkt
2019-12-02 21:21:44
111.93.200.50 attackbots
SSH bruteforce
2019-12-02 21:05:58
211.157.2.92 attackspambots
Dec  2 12:09:28 zeus sshd[23550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.157.2.92 
Dec  2 12:09:30 zeus sshd[23550]: Failed password for invalid user jonathan from 211.157.2.92 port 52526 ssh2
Dec  2 12:16:18 zeus sshd[23700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.157.2.92 
Dec  2 12:16:20 zeus sshd[23700]: Failed password for invalid user lyndsay from 211.157.2.92 port 19003 ssh2
2019-12-02 20:48:15
195.154.112.212 attackbots
SSH Brute-Forcing (ownc)
2019-12-02 20:56:05
41.86.34.52 attackspambots
Dec  2 12:57:44 game-panel sshd[6289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.86.34.52
Dec  2 12:57:46 game-panel sshd[6289]: Failed password for invalid user operator from 41.86.34.52 port 49536 ssh2
Dec  2 13:06:43 game-panel sshd[6702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.86.34.52
2019-12-02 21:07:16
121.46.29.116 attackspam
Invalid user mkh from 121.46.29.116 port 42444
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.29.116
Failed password for invalid user mkh from 121.46.29.116 port 42444 ssh2
Invalid user sos from 121.46.29.116 port 19915
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.29.116
2019-12-02 21:26:19
222.186.173.154 attackspambots
Dec  2 13:41:00 tuxlinux sshd[43562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
...
2019-12-02 20:47:48
138.197.189.136 attack
SSH Brute Force, server-1 sshd[14577]: Failed password for invalid user eichfuss from 138.197.189.136 port 45842 ssh2
2019-12-02 20:57:21
83.221.222.251 attackspam
2019-12-02T12:55:58.235032abusebot-8.cloudsearch.cf sshd\[5432\]: Invalid user brickman from 83.221.222.251 port 33490
2019-12-02 20:59:29
182.61.175.71 attackspam
Dec  2 13:30:51 localhost sshd\[15574\]: Invalid user mie from 182.61.175.71 port 37792
Dec  2 13:30:51 localhost sshd\[15574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.175.71
Dec  2 13:30:53 localhost sshd\[15574\]: Failed password for invalid user mie from 182.61.175.71 port 37792 ssh2
2019-12-02 20:48:50

Recently Reported IPs

149.154.64.118 149.154.159.6 149.154.64.24 149.154.65.245
149.154.66.38 149.154.68.92 149.154.67.113 149.154.65.115
149.154.70.61 193.93.75.51 149.154.99.238 149.154.67.210
149.154.70.132 149.154.88.22 149.154.67.70 149.156.190.151
149.156.2.28 149.156.9.54 149.165.157.17 149.156.191.43