Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
149.18.30.244 spam
Stop logging in my accounts lil bro
2024-02-12 17:52:20
149.18.30.78 spam
Please stop trying to log into my Steam.
2023-03-27 23:32:18
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.18.30.246
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9058
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.18.30.246.			IN	A

;; AUTHORITY SECTION:
.			133	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100602 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 11:52:45 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 246.30.18.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 246.30.18.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
82.208.133.133 attack
Invalid user upload from 82.208.133.133 port 50464
2020-03-13 15:35:52
83.12.107.106 attackspambots
Multiple SSH login attempts.
2020-03-13 15:30:33
142.93.195.189 attackspam
fail2ban -- 142.93.195.189
...
2020-03-13 15:06:48
104.250.166.16 attackbots
Unauthorized connection attempt detected from IP address 104.250.166.16 to port 445
2020-03-13 15:07:15
109.194.54.126 attackspam
<6 unauthorized SSH connections
2020-03-13 15:11:30
158.69.223.91 attack
(sshd) Failed SSH login from 158.69.223.91 (CA/Canada/91.ip-158-69-223.net): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 13 07:56:22 ubnt-55d23 sshd[17895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.223.91  user=root
Mar 13 07:56:24 ubnt-55d23 sshd[17895]: Failed password for root from 158.69.223.91 port 44796 ssh2
2020-03-13 15:17:53
144.22.108.33 attackspam
Invalid user plegrand from 144.22.108.33 port 58404
2020-03-13 15:06:29
106.54.40.11 attack
Mar 13 08:30:27 ncomp sshd[10651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.40.11  user=root
Mar 13 08:30:29 ncomp sshd[10651]: Failed password for root from 106.54.40.11 port 50534 ssh2
Mar 13 08:38:27 ncomp sshd[10894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.40.11  user=root
Mar 13 08:38:28 ncomp sshd[10894]: Failed password for root from 106.54.40.11 port 35496 ssh2
2020-03-13 15:02:46
112.35.27.98 attack
Mar 12 23:54:03 mail sshd\[63875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.27.98  user=root
...
2020-03-13 15:05:28
222.186.173.215 attack
Mar 12 21:17:32 web9 sshd\[5329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
Mar 12 21:17:33 web9 sshd\[5329\]: Failed password for root from 222.186.173.215 port 32876 ssh2
Mar 12 21:17:50 web9 sshd\[5395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
Mar 12 21:17:52 web9 sshd\[5395\]: Failed password for root from 222.186.173.215 port 5658 ssh2
Mar 12 21:17:55 web9 sshd\[5395\]: Failed password for root from 222.186.173.215 port 5658 ssh2
2020-03-13 15:30:12
222.186.175.182 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Failed password for root from 222.186.175.182 port 9526 ssh2
Failed password for root from 222.186.175.182 port 9526 ssh2
Failed password for root from 222.186.175.182 port 9526 ssh2
Failed password for root from 222.186.175.182 port 9526 ssh2
2020-03-13 15:43:49
178.128.81.150 attackbotsspam
Mar 13 07:27:47 ourumov-web sshd\[32056\]: Invalid user ubuntu from 178.128.81.150 port 50442
Mar 13 07:27:47 ourumov-web sshd\[32056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.81.150
Mar 13 07:27:49 ourumov-web sshd\[32056\]: Failed password for invalid user ubuntu from 178.128.81.150 port 50442 ssh2
...
2020-03-13 15:04:40
187.115.123.74 attackspambots
Wordpress Admin Login attack
2020-03-13 15:40:51
222.161.47.82 attack
'IP reached maximum auth failures for a one day block'
2020-03-13 15:00:19
5.188.216.34 attack
B: Magento admin pass test (wrong country)
2020-03-13 15:31:00

Recently Reported IPs

179.0.107.195 119.8.238.213 185.202.108.145 45.148.10.236
92.118.161.83 93.174.93.59 185.143.221.129 242.30.21.163
185.11.146.131 45.141.84.179 89.248.174.56 91.185.56.67
195.78.54.249 45.192.138.24 45.236.171.146 60.248.110.201
159.65.44.230 115.135.33.112 140.237.29.62 20.244.64.126