Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Belgium

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.154.218.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61757
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.154.218.34.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:57:43 CST 2025
;; MSG SIZE  rcvd: 107
Host info
34.218.154.149.in-addr.arpa domain name pointer host-149-154-218-34.dynamic.voo.be.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
34.218.154.149.in-addr.arpa	name = host-149-154-218-34.dynamic.voo.be.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
80.211.95.201 attackbotsspam
Oct  1 01:12:09 ks10 sshd[22204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.95.201 
Oct  1 01:12:11 ks10 sshd[22204]: Failed password for invalid user bsnl from 80.211.95.201 port 43342 ssh2
...
2019-10-01 08:58:11
187.63.12.2 attack
Automatic report - Port Scan Attack
2019-10-01 09:03:51
193.112.94.98 attackspambots
Oct  1 00:36:55 marvibiene sshd[13746]: Invalid user www from 193.112.94.98 port 35680
Oct  1 00:36:55 marvibiene sshd[13746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.94.98
Oct  1 00:36:55 marvibiene sshd[13746]: Invalid user www from 193.112.94.98 port 35680
Oct  1 00:36:57 marvibiene sshd[13746]: Failed password for invalid user www from 193.112.94.98 port 35680 ssh2
...
2019-10-01 08:59:43
222.186.173.201 attack
$f2bV_matches
2019-10-01 08:50:50
203.156.63.19 attack
WordPress wp-login brute force :: 203.156.63.19 0.180 BYPASS [01/Oct/2019:13:55:45  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-01 12:00:06
185.222.211.250 attackspam
3389BruteforceFW22
2019-10-01 09:27:40
187.163.82.186 attackspam
19/9/30@16:54:40: FAIL: Alarm-Intrusion address from=187.163.82.186
...
2019-10-01 08:46:52
14.231.252.160 attack
Chat Spam
2019-10-01 09:08:34
103.124.89.205 attack
2019-09-30T23:07:33.511004hub.schaetter.us sshd\[9232\]: Invalid user odoo from 103.124.89.205 port 36398
2019-09-30T23:07:33.534086hub.schaetter.us sshd\[9232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.124.89.205
2019-09-30T23:07:35.684131hub.schaetter.us sshd\[9232\]: Failed password for invalid user odoo from 103.124.89.205 port 36398 ssh2
2019-09-30T23:12:06.531416hub.schaetter.us sshd\[9264\]: Invalid user damian from 103.124.89.205 port 51220
2019-09-30T23:12:06.541869hub.schaetter.us sshd\[9264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.124.89.205
...
2019-10-01 09:01:10
138.68.28.46 attack
Automatic report - Banned IP Access
2019-10-01 09:04:34
176.31.43.255 attackspam
Sep 30 23:23:50 ns3110291 sshd\[21674\]: Invalid user corp from 176.31.43.255
Sep 30 23:23:52 ns3110291 sshd\[21674\]: Failed password for invalid user corp from 176.31.43.255 port 35618 ssh2
Sep 30 23:27:36 ns3110291 sshd\[21912\]: Invalid user ax from 176.31.43.255
Sep 30 23:27:38 ns3110291 sshd\[21912\]: Failed password for invalid user ax from 176.31.43.255 port 49822 ssh2
Sep 30 23:31:11 ns3110291 sshd\[28571\]: Invalid user typo3 from 176.31.43.255
...
2019-10-01 08:55:05
5.196.110.170 attackspam
Invalid user squid from 5.196.110.170 port 58138
2019-10-01 09:13:38
117.184.119.10 attackbots
Sep 30 21:34:44 localhost sshd\[38112\]: Invalid user alexie123 from 117.184.119.10 port 2757
Sep 30 21:34:44 localhost sshd\[38112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.184.119.10
Sep 30 21:34:45 localhost sshd\[38112\]: Failed password for invalid user alexie123 from 117.184.119.10 port 2757 ssh2
Sep 30 21:37:47 localhost sshd\[38224\]: Invalid user jgreen from 117.184.119.10 port 2758
Sep 30 21:37:47 localhost sshd\[38224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.184.119.10
...
2019-10-01 08:59:59
51.68.139.151 attackspam
Automated report - ssh fail2ban:
Oct 1 02:29:56 authentication failure 
Oct 1 02:29:58 wrong password, user=abel, port=44740, ssh2
Oct 1 02:30:01 wrong password, user=abel, port=44740, ssh2
Oct 1 02:30:06 wrong password, user=abel, port=44740, ssh2
2019-10-01 09:05:13
156.194.131.241 attack
Chat Spam
2019-10-01 09:08:00

Recently Reported IPs

118.184.61.75 220.122.188.235 141.149.11.245 26.241.252.96
151.209.93.67 30.192.3.42 195.62.233.104 188.42.120.136
76.115.119.158 218.147.147.84 49.84.123.238 89.195.239.53
75.81.183.201 54.50.215.40 181.60.174.221 238.27.33.101
19.227.114.198 27.87.51.57 190.98.242.0 19.178.242.0