Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.16.124.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37739
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.16.124.140.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 14:07:11 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 140.124.16.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.124.16.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
2.153.184.166 attackbotsspam
Jun 26 18:15:05 web24hdcode sshd[122077]: Invalid user git5 from 2.153.184.166 port 48058
Jun 26 18:15:05 web24hdcode sshd[122077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.153.184.166
Jun 26 18:15:05 web24hdcode sshd[122077]: Invalid user git5 from 2.153.184.166 port 48058
Jun 26 18:15:07 web24hdcode sshd[122077]: Failed password for invalid user git5 from 2.153.184.166 port 48058 ssh2
Jun 26 18:17:06 web24hdcode sshd[122083]: Invalid user tomcat from 2.153.184.166 port 36792
Jun 26 18:17:06 web24hdcode sshd[122083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.153.184.166
Jun 26 18:17:06 web24hdcode sshd[122083]: Invalid user tomcat from 2.153.184.166 port 36792
Jun 26 18:17:07 web24hdcode sshd[122083]: Failed password for invalid user tomcat from 2.153.184.166 port 36792 ssh2
Jun 26 18:19:01 web24hdcode sshd[122087]: Invalid user logger from 2.153.184.166 port 53762
...
2019-06-27 02:09:56
37.216.242.186 attack
Unauthorized connection attempt from IP address 37.216.242.186 on Port 445(SMB)
2019-06-27 02:39:55
62.12.69.144 attackbots
5555/tcp
[2019-06-26]1pkt
2019-06-27 02:15:20
49.88.226.183 attackspambots
SASL Brute Force
2019-06-27 02:25:04
193.9.245.143 attack
RDP Brute-Force (Grieskirchen RZ1)
2019-06-27 02:14:21
222.217.221.181 attackbots
Brute force attempt
2019-06-27 02:32:45
168.194.152.107 attack
SMTP-sasl brute force
...
2019-06-27 02:13:33
87.100.243.117 attackbotsspam
Jun 26 18:52:32 s64-1 sshd[29891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.100.243.117
Jun 26 18:52:35 s64-1 sshd[29891]: Failed password for invalid user admin from 87.100.243.117 port 42482 ssh2
Jun 26 18:59:34 s64-1 sshd[29962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.100.243.117
...
2019-06-27 02:20:25
107.170.192.6 attackspam
22/tcp 179/tcp 21029/tcp...
[2019-04-26/06-26]51pkt,41pt.(tcp),5pt.(udp)
2019-06-27 02:28:14
111.185.239.75 attackbots
firewall-block, port(s): 23/tcp
2019-06-27 02:44:47
216.243.31.2 attackspam
Jun 26 15:15:15   DDOS Attack: SRC=216.243.31.2 DST=[Masked] LEN=40 TOS=0x08 PREC=0x60 TTL=46  DF PROTO=TCP SPT=56051 DPT=80 WINDOW=0 RES=0x00 RST URGP=0
2019-06-27 02:37:46
212.47.254.106 attackspam
20 attempts against mh-misbehave-ban on pluto.magehost.pro
2019-06-27 02:41:33
185.137.233.225 attackspambots
proto=tcp  .  spt=60000  .  dpt=3389  .  src=185.137.233.225  .  dst=xx.xx.4.1  .     (listed on Alienvault Jun 26)     (1114)
2019-06-27 02:29:54
209.17.97.26 attack
Unauthorised access (Jun 26) SRC=209.17.97.26 LEN=44 TOS=0x08 PREC=0x20 TTL=243 ID=54321 TCP DPT=8080 WINDOW=65535 SYN
2019-06-27 02:45:41
191.53.236.219 attackbotsspam
SMTP-sasl brute force
...
2019-06-27 02:18:53

Recently Reported IPs

4.11.231.21 54.248.4.81 193.27.229.67 253.127.202.56
101.123.214.155 67.230.191.176 37.240.188.10 216.240.155.58
143.2.118.51 55.87.153.159 74.193.116.180 29.92.26.164
166.153.174.140 132.133.147.128 19.249.239.2 78.4.9.32
55.242.75.157 6.86.31.122 104.244.24.156 121.212.141.139