Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Portage

Region: Indiana

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.162.80.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14021
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.162.80.147.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 08:43:12 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 147.80.162.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.80.162.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
40.77.167.55 attackbotsspam
Automatic report - Banned IP Access
2020-07-15 06:56:06
62.121.84.109 attackspam
Automatic report - XMLRPC Attack
2020-07-15 07:15:22
87.251.231.101 attackspambots
Automatic report - Banned IP Access
2020-07-15 07:03:21
211.159.218.251 attack
SSH invalid-user multiple login attempts
2020-07-15 07:22:24
183.56.201.121 attack
Failed password for invalid user myu from 183.56.201.121 port 43137 ssh2
2020-07-15 07:14:27
212.154.17.10 attackspambots
Honeypot attack, port: 445, PTR: 10.17.154.212.static.turk.net.
2020-07-15 06:59:07
180.247.160.117 attackbots
Automatic report - Port Scan Attack
2020-07-15 07:07:44
187.4.205.146 attackbots
1594751141 - 07/14/2020 20:25:41 Host: 187.4.205.146/187.4.205.146 Port: 445 TCP Blocked
2020-07-15 06:54:04
194.26.29.168 attackspambots
Multiport scan : 449 ports scanned 15023 15075 15087 15119 15145 15172 15184 15218 15233 15242 15248 15254 15262 15266 15278 15284 15287 15290 15292 15294 15302 15306 15308 15320 15357 15359 15373 15385 15391 15397 15403 15409 15415 15418 15433 15436 15439 15445 15457 15461 15463 15469 15472 15481 15493 15496 15503 15522 15552 15564 15570 15582 15588 15600 15603 15606 15609 15628 15630 15633 15634 15639 15646 15648 15654 15657 15658 .....
2020-07-15 06:59:49
47.184.64.96 attackbots
Invalid user applvis from 47.184.64.96 port 41374
2020-07-15 07:08:52
183.62.101.90 attack
Jul 14 12:18:34 : SSH login attempts with invalid user
2020-07-15 07:01:33
190.0.8.134 attackbotsspam
Jul 14 21:30:11 scw-6657dc sshd[5130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.0.8.134
Jul 14 21:30:11 scw-6657dc sshd[5130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.0.8.134
Jul 14 21:30:13 scw-6657dc sshd[5130]: Failed password for invalid user demo from 190.0.8.134 port 19689 ssh2
...
2020-07-15 07:22:55
60.165.219.14 attack
Invalid user shiying from 60.165.219.14 port 32386
2020-07-15 07:20:44
101.32.1.249 attack
SSH Invalid Login
2020-07-15 07:19:23
124.67.69.174 attack
DATE:2020-07-14 20:25:42, IP:124.67.69.174, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2020-07-15 06:54:44

Recently Reported IPs

238.237.22.94 75.125.53.97 205.57.152.179 39.213.184.189
155.143.7.254 89.242.230.69 233.24.216.165 180.12.144.154
163.252.169.139 3.55.159.29 31.99.139.92 52.136.104.11
58.150.173.233 200.96.224.196 77.42.200.150 254.74.125.149
168.65.23.41 50.183.49.171 164.194.199.89 34.59.59.39