Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.18.56.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26487
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.18.56.14.			IN	A

;; AUTHORITY SECTION:
.			249	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022101002 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 11 19:24:34 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 14.56.18.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.56.18.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.145.19.99 attackbotsspam
Reported by AbuseIPDB proxy server.
2019-09-04 00:59:33
94.179.130.214 attack
Unauthorized connection attempt from IP address 94.179.130.214 on Port 445(SMB)
2019-09-04 00:39:38
125.24.144.59 attackbots
Unauthorized connection attempt from IP address 125.24.144.59 on Port 445(SMB)
2019-09-04 00:05:04
114.143.49.66 attackbotsspam
Unauthorized connection attempt from IP address 114.143.49.66 on Port 445(SMB)
2019-09-04 01:14:52
103.9.126.82 attackbots
Unauthorized connection attempt from IP address 103.9.126.82 on Port 445(SMB)
2019-09-04 00:50:47
183.83.88.250 attack
Unauthorized connection attempt from IP address 183.83.88.250 on Port 445(SMB)
2019-09-04 00:44:40
190.145.55.89 attackbots
Sep  3 18:46:13 rpi sshd[7269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.55.89 
Sep  3 18:46:15 rpi sshd[7269]: Failed password for invalid user lam from 190.145.55.89 port 38743 ssh2
2019-09-04 00:56:54
40.112.248.127 attackspam
Sep  3 20:35:30 lcl-usvr-02 sshd[12458]: Invalid user monitoring from 40.112.248.127 port 8256
Sep  3 20:35:30 lcl-usvr-02 sshd[12458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.112.248.127
Sep  3 20:35:30 lcl-usvr-02 sshd[12458]: Invalid user monitoring from 40.112.248.127 port 8256
Sep  3 20:35:32 lcl-usvr-02 sshd[12458]: Failed password for invalid user monitoring from 40.112.248.127 port 8256 ssh2
Sep  3 20:43:34 lcl-usvr-02 sshd[14394]: Invalid user teste from 40.112.248.127 port 8256
...
2019-09-04 00:06:55
201.231.46.226 attackspambots
Automatic report - Port Scan Attack
2019-09-04 00:35:47
183.60.21.118 attack
$f2bV_matches
2019-09-04 00:52:03
105.242.85.77 attack
PHI,WP GET /wp-login.php
2019-09-04 00:08:15
104.139.5.180 attackbots
Sep  3 18:37:49 vps691689 sshd[21946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.139.5.180
Sep  3 18:37:52 vps691689 sshd[21946]: Failed password for invalid user ria from 104.139.5.180 port 45510 ssh2
Sep  3 18:42:36 vps691689 sshd[22077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.139.5.180
...
2019-09-04 00:46:21
195.85.246.11 attackspam
2019-09-03T10:01:30.117669mail01 postfix/smtpd[13888]: warning: externalservers.aspex.be[195.85.246.11]: SASL login authentication failed: UGFzc3dvcmQ6
2019-09-03T10:02:32.221785mail01 postfix/smtpd[14656]: warning: externalservers.aspex.be[195.85.246.11]: SASL login authentication failed: UGFzc3dvcmQ6
2019-09-03T10:03:20.245989mail01 postfix/smtpd[13888]: warning: externalservers.aspex.be[195.85.246.11]: SASL login authentication failed: UGFzc3dvcmQ6
2019-09-04 01:05:12
108.222.68.232 attackbotsspam
Sep  3 14:36:46 MK-Soft-VM5 sshd\[12537\]: Invalid user 123 from 108.222.68.232 port 42428
Sep  3 14:36:46 MK-Soft-VM5 sshd\[12537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.222.68.232
Sep  3 14:36:48 MK-Soft-VM5 sshd\[12537\]: Failed password for invalid user 123 from 108.222.68.232 port 42428 ssh2
...
2019-09-04 01:10:40
121.122.103.63 attackspambots
Sep  3 11:12:39 SilenceServices sshd[2040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.122.103.63
Sep  3 11:12:41 SilenceServices sshd[2040]: Failed password for invalid user deploy from 121.122.103.63 port 10286 ssh2
Sep  3 11:17:25 SilenceServices sshd[3839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.122.103.63
2019-09-04 00:30:47

Recently Reported IPs

149.18.28.222 149.18.57.200 185.62.189.18 185.173.35.225
167.94.146.241 45.148.10.234 196.52.43.230 65.21.246.232
45.33.65.191 112.166.153.239 103.199.209.143 103.250.142.2
103.251.67.140 149.18.56.87 149.57.13.202 38.105.196.138
201.27.35.29 187.142.43.232 12.143.189.22 121.226.219.67