Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.18.56.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14111
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.18.56.249.			IN	A

;; AUTHORITY SECTION:
.			473	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022101100 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 11 22:47:00 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 249.56.18.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 249.56.18.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.242.36.180 attackbotsspam
Unauthorized connection attempt from IP address 14.242.36.180 on Port 445(SMB)
2019-11-25 19:09:24
114.64.255.188 attackbots
Nov 25 05:28:21 finn sshd[27745]: Invalid user guest from 114.64.255.188 port 59248
Nov 25 05:28:21 finn sshd[27745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.64.255.188
Nov 25 05:28:23 finn sshd[27745]: Failed password for invalid user guest from 114.64.255.188 port 59248 ssh2
Nov 25 05:28:23 finn sshd[27745]: Received disconnect from 114.64.255.188 port 59248:11: Bye Bye [preauth]
Nov 25 05:28:23 finn sshd[27745]: Disconnected from 114.64.255.188 port 59248 [preauth]
Nov 25 05:34:19 finn sshd[29005]: Invalid user rojek from 114.64.255.188 port 40816
Nov 25 05:34:19 finn sshd[29005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.64.255.188


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.64.255.188
2019-11-25 19:04:22
118.89.61.51 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.61.51  user=root
Failed password for root from 118.89.61.51 port 56060 ssh2
Invalid user katharyn from 118.89.61.51 port 32968
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.61.51
Failed password for invalid user katharyn from 118.89.61.51 port 32968 ssh2
2019-11-25 18:59:15
46.63.64.120 attack
Automatic report - Banned IP Access
2019-11-25 18:47:11
78.135.31.200 attackbotsspam
UTC: 2019-11-24 port: 23/tcp
2019-11-25 19:21:07
106.12.221.63 attack
Nov 25 09:49:56 microserver sshd[49621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.221.63  user=root
Nov 25 09:49:58 microserver sshd[49621]: Failed password for root from 106.12.221.63 port 51854 ssh2
Nov 25 09:58:17 microserver sshd[50803]: Invalid user webmaster from 106.12.221.63 port 58466
Nov 25 09:58:17 microserver sshd[50803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.221.63
Nov 25 09:58:19 microserver sshd[50803]: Failed password for invalid user webmaster from 106.12.221.63 port 58466 ssh2
Nov 25 10:15:09 microserver sshd[53149]: Invalid user www from 106.12.221.63 port 48190
Nov 25 10:15:09 microserver sshd[53149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.221.63
Nov 25 10:15:12 microserver sshd[53149]: Failed password for invalid user www from 106.12.221.63 port 48190 ssh2
Nov 25 10:24:22 microserver sshd[54159]: Invalid user pgsql from 106.
2019-11-25 19:13:39
149.56.108.53 attack
Automatic report - XMLRPC Attack
2019-11-25 19:16:39
36.89.157.197 attackspam
Nov 25 02:13:19 linuxvps sshd\[44728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.157.197  user=root
Nov 25 02:13:21 linuxvps sshd\[44728\]: Failed password for root from 36.89.157.197 port 4238 ssh2
Nov 25 02:17:15 linuxvps sshd\[47115\]: Invalid user tahani from 36.89.157.197
Nov 25 02:17:15 linuxvps sshd\[47115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.157.197
Nov 25 02:17:16 linuxvps sshd\[47115\]: Failed password for invalid user tahani from 36.89.157.197 port 47198 ssh2
2019-11-25 19:04:06
81.4.125.197 attack
Nov 25 12:25:00 www2 sshd\[64152\]: Invalid user Academics from 81.4.125.197Nov 25 12:25:02 www2 sshd\[64152\]: Failed password for invalid user Academics from 81.4.125.197 port 35862 ssh2Nov 25 12:31:16 www2 sshd\[65021\]: Invalid user kallio from 81.4.125.197
...
2019-11-25 19:04:34
106.13.7.186 attack
Nov 25 03:05:33 linuxvps sshd\[11517\]: Invalid user nippes from 106.13.7.186
Nov 25 03:05:33 linuxvps sshd\[11517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.7.186
Nov 25 03:05:35 linuxvps sshd\[11517\]: Failed password for invalid user nippes from 106.13.7.186 port 35164 ssh2
Nov 25 03:09:52 linuxvps sshd\[14207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.7.186  user=root
Nov 25 03:09:54 linuxvps sshd\[14207\]: Failed password for root from 106.13.7.186 port 39198 ssh2
2019-11-25 18:52:10
51.83.72.132 attack
Automatic report - XMLRPC Attack
2019-11-25 19:08:00
112.215.113.10 attack
2019-11-24 UTC: 2x - Admin(2x)
2019-11-25 19:14:59
89.148.46.192 attackspam
2019-11-25T17:24:19.238430luisaranguren sshd[4126555]: Connection from 89.148.46.192 port 46357 on 10.10.10.6 port 22 rdomain ""
2019-11-25T17:24:27.194083luisaranguren sshd[4126555]: Invalid user 666666 from 89.148.46.192 port 46357
2019-11-25T17:24:27.464415luisaranguren sshd[4126555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.148.46.192
2019-11-25T17:24:19.238430luisaranguren sshd[4126555]: Connection from 89.148.46.192 port 46357 on 10.10.10.6 port 22 rdomain ""
2019-11-25T17:24:27.194083luisaranguren sshd[4126555]: Invalid user 666666 from 89.148.46.192 port 46357
2019-11-25T17:24:29.841614luisaranguren sshd[4126555]: Failed password for invalid user 666666 from 89.148.46.192 port 46357 ssh2
...
2019-11-25 19:08:21
199.58.86.209 attackbotsspam
Automatic report - Banned IP Access
2019-11-25 18:46:16
185.236.200.24 attack
185.236.200.24 was recorded 5 times by 1 hosts attempting to connect to the following ports: 51413. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-25 18:54:53

Recently Reported IPs

116.57.185.220 77.83.86.133 102.221.208.173 179.2.145.228
185.77.220.24 149.18.56.60 45.147.28.196 189.90.248.16
92.205.61.255 120.236.14.238 83.171.254.165 193.233.229.37
213.166.76.196 114.218.129.173 31.6.19.184 23.229.116.219
162.240.215.17 107.152.157.168 144.168.194.169 144.168.242.158