Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Zebulon

Region: North Carolina

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.168.209.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58707
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.168.209.219.		IN	A

;; AUTHORITY SECTION:
.			72	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062100 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 21 16:10:56 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 219.209.168.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 219.209.168.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.220.102.252 attackspambots
Aug 18 00:56:26 santamaria sshd\[4186\]: Invalid user admin from 185.220.102.252
Aug 18 00:56:27 santamaria sshd\[4186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.252
Aug 18 00:56:29 santamaria sshd\[4186\]: Failed password for invalid user admin from 185.220.102.252 port 27442 ssh2
...
2020-08-18 06:56:53
185.233.187.222 attackspam
Chat Spam
2020-08-18 07:22:27
45.227.254.30 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 28 - port: 24557 proto: tcp cat: Misc Attackbytes: 60
2020-08-18 07:25:04
191.193.236.127 attackbots
1597695907 - 08/17/2020 22:25:07 Host: 191.193.236.127/191.193.236.127 Port: 445 TCP Blocked
2020-08-18 07:26:40
129.211.146.50 attackbots
Aug 17 16:54:14 NPSTNNYC01T sshd[30687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.146.50
Aug 17 16:54:16 NPSTNNYC01T sshd[30687]: Failed password for invalid user redmine from 129.211.146.50 port 51322 ssh2
Aug 17 17:00:04 NPSTNNYC01T sshd[31188]: Failed password for root from 129.211.146.50 port 59510 ssh2
...
2020-08-18 07:11:53
83.97.20.248 attackspambots
Aug 17 23:46:25 icecube sshd[20175]: Invalid user admin from 83.97.20.248 port 37830
Aug 17 23:46:25 icecube sshd[20175]: Failed password for invalid user admin from 83.97.20.248 port 37830 ssh2
2020-08-18 07:13:33
196.52.43.111 attackbotsspam
 TCP (SYN) 196.52.43.111:63728 -> port 7547, len 44
2020-08-18 07:12:48
59.144.48.34 attack
2020-08-17T23:44:08.892763n23.at sshd[1336962]: Invalid user user from 59.144.48.34 port 5449
2020-08-17T23:44:10.915057n23.at sshd[1336962]: Failed password for invalid user user from 59.144.48.34 port 5449 ssh2
2020-08-17T23:48:51.258697n23.at sshd[1341624]: Invalid user cbt from 59.144.48.34 port 2103
...
2020-08-18 06:56:27
129.204.28.114 attack
Aug 18 01:20:57 ncomp sshd[20363]: Invalid user eli from 129.204.28.114
Aug 18 01:20:57 ncomp sshd[20363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.28.114
Aug 18 01:20:57 ncomp sshd[20363]: Invalid user eli from 129.204.28.114
Aug 18 01:21:00 ncomp sshd[20363]: Failed password for invalid user eli from 129.204.28.114 port 51468 ssh2
2020-08-18 07:32:44
121.142.87.218 attackbots
Aug 17 22:49:35 eventyay sshd[8397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.142.87.218
Aug 17 22:49:36 eventyay sshd[8397]: Failed password for invalid user gpb from 121.142.87.218 port 44950 ssh2
Aug 17 22:52:41 eventyay sshd[8495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.142.87.218
...
2020-08-18 07:08:10
143.255.130.2 attack
Aug 18 01:19:22 plg sshd[3065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.255.130.2 
Aug 18 01:19:24 plg sshd[3065]: Failed password for invalid user suresh from 143.255.130.2 port 47890 ssh2
Aug 18 01:21:31 plg sshd[3100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.255.130.2 
Aug 18 01:21:33 plg sshd[3100]: Failed password for invalid user ubuntu from 143.255.130.2 port 50264 ssh2
Aug 18 01:23:43 plg sshd[3132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.255.130.2 
Aug 18 01:23:45 plg sshd[3132]: Failed password for invalid user mnm from 143.255.130.2 port 52632 ssh2
Aug 18 01:25:57 plg sshd[3171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.255.130.2 
...
2020-08-18 07:28:38
140.143.247.30 attack
2020-08-18T00:32:29.059532centos sshd[24757]: Invalid user www from 140.143.247.30 port 35518
2020-08-18T00:32:30.669466centos sshd[24757]: Failed password for invalid user www from 140.143.247.30 port 35518 ssh2
2020-08-18T00:41:01.032548centos sshd[25246]: Invalid user joerg from 140.143.247.30 port 45618
...
2020-08-18 07:07:40
104.216.60.178 attackspam
Debt Help 
2020-08-18 07:23:57
179.111.208.81 attackspambots
Aug 17 23:15:23 journals sshd\[46910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.111.208.81  user=root
Aug 17 23:15:24 journals sshd\[46910\]: Failed password for root from 179.111.208.81 port 44246 ssh2
Aug 17 23:20:20 journals sshd\[47598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.111.208.81  user=root
Aug 17 23:20:22 journals sshd\[47598\]: Failed password for root from 179.111.208.81 port 16419 ssh2
Aug 17 23:25:11 journals sshd\[48164\]: Invalid user dai from 179.111.208.81
...
2020-08-18 07:22:48
106.12.91.102 attack
Port scan: Attack repeated for 24 hours
2020-08-18 07:23:34

Recently Reported IPs

137.226.154.110 5.167.64.174 137.226.2.114 5.167.64.198
5.167.64.255 185.86.148.90 5.167.64.238 5.167.65.11
61.177.173.36 125.139.90.123 5.167.64.179 5.167.65.37
2.206.50.225 129.205.185.153 182.253.155.92 118.136.150.29
5.25.66.70 77.132.148.22 5.167.65.13 131.196.217.94