Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.172.222.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55053
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;149.172.222.239.		IN	A

;; AUTHORITY SECTION:
.			374	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103101 1800 900 604800 86400

;; Query time: 129 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 01 09:14:32 CST 2019
;; MSG SIZE  rcvd: 119
Host info
239.222.172.149.in-addr.arpa domain name pointer HSI-KBW-149-172-222-239.hsi13.kabel-badenwuerttemberg.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
239.222.172.149.in-addr.arpa	name = HSI-KBW-149-172-222-239.hsi13.kabel-badenwuerttemberg.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.175.93.3 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-08-25 20:23:36
191.53.222.134 attackspam
Unauthorized connection attempt from IP address 191.53.222.134 on Port 587(SMTP-MSA)
2019-08-25 20:54:15
146.88.240.4 attackbots
RPC Portmapper DUMP Request Detected CVE-2001-1124, PTR: www.arbor-observatory.com.
2019-08-25 20:57:49
92.42.44.97 attack
2019-08-25T12:15:34.664269abusebot.cloudsearch.cf sshd\[15856\]: Invalid user a1b2c3 from 92.42.44.97 port 37894
2019-08-25T12:15:34.670086abusebot.cloudsearch.cf sshd\[15856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.42.44.97
2019-08-25 20:26:09
117.4.99.116 attack
Unauthorized connection attempt from IP address 117.4.99.116 on Port 445(SMB)
2019-08-25 20:21:35
51.15.242.148 attack
xmlrpc attack
2019-08-25 20:04:59
101.227.90.169 attackbots
Invalid user cgi from 101.227.90.169 port 35970
2019-08-25 20:22:16
221.203.129.69 attack
Unauthorised access (Aug 25) SRC=221.203.129.69 LEN=40 TTL=49 ID=11873 TCP DPT=8080 WINDOW=12107 SYN 
Unauthorised access (Aug 25) SRC=221.203.129.69 LEN=40 TTL=49 ID=54947 TCP DPT=8080 WINDOW=29123 SYN 
Unauthorised access (Aug 25) SRC=221.203.129.69 LEN=40 TTL=49 ID=53129 TCP DPT=8080 WINDOW=47876 SYN
2019-08-25 20:09:32
85.192.35.167 attackspambots
Aug 25 02:04:02 tdfoods sshd\[19359\]: Invalid user seij from 85.192.35.167
Aug 25 02:04:02 tdfoods sshd\[19359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.192.35.167
Aug 25 02:04:04 tdfoods sshd\[19359\]: Failed password for invalid user seij from 85.192.35.167 port 51784 ssh2
Aug 25 02:08:22 tdfoods sshd\[19835\]: Invalid user Victor from 85.192.35.167
Aug 25 02:08:22 tdfoods sshd\[19835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.192.35.167
2019-08-25 20:18:08
116.107.162.138 attack
Unauthorized connection attempt from IP address 116.107.162.138 on Port 445(SMB)
2019-08-25 20:10:30
117.241.90.85 attackbotsspam
Unauthorized connection attempt from IP address 117.241.90.85 on Port 445(SMB)
2019-08-25 20:50:58
104.236.33.155 attackbots
Aug 25 13:52:49 debian sshd\[10280\]: Invalid user yasmina from 104.236.33.155 port 45736
Aug 25 13:52:49 debian sshd\[10280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.33.155
...
2019-08-25 20:54:50
218.150.220.214 attack
Aug 25 09:58:09 XXX sshd[11661]: Invalid user ofsaa from 218.150.220.214 port 43692
2019-08-25 20:47:35
216.45.23.6 attackbotsspam
Aug 25 01:42:13 php2 sshd\[14423\]: Invalid user hans from 216.45.23.6
Aug 25 01:42:13 php2 sshd\[14423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.45.23.6
Aug 25 01:42:15 php2 sshd\[14423\]: Failed password for invalid user hans from 216.45.23.6 port 48247 ssh2
Aug 25 01:46:43 php2 sshd\[14851\]: Invalid user info2 from 216.45.23.6
Aug 25 01:46:43 php2 sshd\[14851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.45.23.6
2019-08-25 20:00:48
185.175.93.25 attack
Portscan or hack attempt detected by psad/fwsnort
2019-08-25 20:12:58

Recently Reported IPs

181.42.97.127 113.204.154.48 162.104.26.127 30.176.219.163
145.64.94.143 249.164.204.73 7.62.116.86 178.184.78.203
1.165.171.93 150.160.178.130 128.228.127.133 166.185.12.78
126.211.101.55 147.114.74.38 227.117.187.166 252.231.89.1
159.155.143.182 155.171.221.123 11.208.12.142 187.217.107.6