Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.18.57.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46129
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.18.57.70.			IN	A

;; AUTHORITY SECTION:
.			312	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100602 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 12:14:56 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 70.57.18.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.57.18.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
67.183.247.89 attackbotsspam
Jul 16 15:42:08 localhost sshd\[26253\]: Invalid user test from 67.183.247.89 port 59704
Jul 16 15:42:08 localhost sshd\[26253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.183.247.89
Jul 16 15:42:10 localhost sshd\[26253\]: Failed password for invalid user test from 67.183.247.89 port 59704 ssh2
2019-07-16 21:50:19
217.182.158.104 attackspam
Jul 16 10:51:33 plusreed sshd[16089]: Invalid user xl from 217.182.158.104
...
2019-07-16 22:54:17
79.137.86.205 attackbotsspam
Jul 16 16:10:48 SilenceServices sshd[20469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.86.205
Jul 16 16:10:49 SilenceServices sshd[20469]: Failed password for invalid user www from 79.137.86.205 port 52652 ssh2
Jul 16 16:17:11 SilenceServices sshd[24288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.86.205
2019-07-16 22:28:26
61.173.150.167 attackbots
abuse-sasl
2019-07-16 22:04:12
124.166.240.130 attack
Port scan: Attack repeated for 24 hours
2019-07-16 22:48:51
134.73.76.89 attackspambots
Jul 16 12:04:40 xb0 postfix/smtpd[3541]: connect from overload.juntosms.com[134.73.76.89]
Jul 16 12:04:40 xb0 postgrey[1242]: action=greylist, reason=new, client_name=overload.juntosms.com, client_address=134.73.76.89, sender=x@x recipient=x@x
Jul 16 12:05:21 xb0 postfix/smtpd[3541]: disconnect from overload.juntosms.com[134.73.76.89]
Jul 16 12:07:41 xb0 postfix/smtpd[29194]: connect from overload.juntosms.com[134.73.76.89]
Jul 16 12:07:41 xb0 postgrey[1242]: action=greylist, reason=new, client_name=overload.juntosms.com, client_address=134.73.76.89, sender=x@x recipient=x@x
Jul 16 12:08:21 xb0 postfix/smtpd[29194]: disconnect from overload.juntosms.com[134.73.76.89]
Jul 16 12:09:38 xb0 postfix/smtpd[30677]: connect from overload.juntosms.com[134.73.76.89]
Jul 16 12:09:39 xb0 postgrey[1242]: action=greylist, reason=new, client_name=overload.juntosms.com, client_address=134.73.76.89, sender=x@x recipient=x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=134
2019-07-16 22:31:07
131.117.215.218 attackspam
" "
2019-07-16 21:48:18
180.151.37.162 attack
Unauthorised access (Jul 16) SRC=180.151.37.162 LEN=52 PREC=0x20 TTL=109 ID=3940 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-16 22:06:19
177.53.236.114 attack
Jul 16 10:52:33 server6 sshd[31714]: Bad protocol version identification '' from 177.53.236.114 port 41063
Jul 16 10:52:38 server6 sshd[31715]: Failed password for invalid user nexthink from 177.53.236.114 port 41327 ssh2
Jul 16 10:52:38 server6 sshd[31715]: Connection closed by 177.53.236.114 [preauth]
Jul 16 10:52:41 server6 sshd[31748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.53.236.114  user=r.r
Jul 16 10:52:44 server6 sshd[31748]: Failed password for r.r from 177.53.236.114 port 43050 ssh2
Jul 16 10:52:45 server6 sshd[31748]: Connection closed by 177.53.236.114 [preauth]
Jul 16 10:52:48 server6 sshd[31840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.53.236.114  user=r.r
Jul 16 10:52:50 server6 sshd[31840]: Failed password for r.r from 177.53.236.114 port 44942 ssh2
Jul 16 10:52:51 server6 sshd[31840]: Connection closed by 177.53.236.114 [preauth]
Jul 16 10:52:54 ser........
-------------------------------
2019-07-16 22:46:00
47.95.195.212 attackbots
Automatic report - Banned IP Access
2019-07-16 22:20:54
162.242.174.119 attackbotsspam
Jul 16 15:37:40 legacy sshd[19317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.242.174.119
Jul 16 15:37:42 legacy sshd[19317]: Failed password for invalid user kay from 162.242.174.119 port 40502 ssh2
Jul 16 15:42:35 legacy sshd[19470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.242.174.119
...
2019-07-16 21:58:29
106.13.72.28 attack
Jul 16 14:34:34 localhost sshd\[26516\]: Invalid user test from 106.13.72.28 port 40274
Jul 16 14:34:34 localhost sshd\[26516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.28
...
2019-07-16 22:04:55
59.185.244.243 attackbots
Jul 16 15:57:50 OPSO sshd\[387\]: Invalid user gwen from 59.185.244.243 port 36260
Jul 16 15:57:50 OPSO sshd\[387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.185.244.243
Jul 16 15:57:52 OPSO sshd\[387\]: Failed password for invalid user gwen from 59.185.244.243 port 36260 ssh2
Jul 16 16:03:35 OPSO sshd\[1489\]: Invalid user lauren from 59.185.244.243 port 32881
Jul 16 16:03:35 OPSO sshd\[1489\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.185.244.243
2019-07-16 22:05:26
220.94.205.234 attackspambots
Jul 16 10:41:35 server sshd\[192849\]: Invalid user marte from 220.94.205.234
Jul 16 10:41:35 server sshd\[192849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.94.205.234
Jul 16 10:41:38 server sshd\[192849\]: Failed password for invalid user marte from 220.94.205.234 port 46444 ssh2
...
2019-07-16 22:42:29
125.123.24.78 attackbotsspam
Jul 16 08:38:03 econome sshd[21516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.123.24.78  user=r.r
Jul 16 08:38:05 econome sshd[21516]: Failed password for r.r from 125.123.24.78 port 33786 ssh2
Jul 16 08:38:07 econome sshd[21516]: Failed password for r.r from 125.123.24.78 port 33786 ssh2
Jul 16 08:38:09 econome sshd[21516]: Failed password for r.r from 125.123.24.78 port 33786 ssh2
Jul 16 08:38:12 econome sshd[21516]: Failed password for r.r from 125.123.24.78 port 33786 ssh2
Jul 16 08:38:14 econome sshd[21516]: Failed password for r.r from 125.123.24.78 port 33786 ssh2
Jul 16 08:38:17 econome sshd[21516]: Failed password for r.r from 125.123.24.78 port 33786 ssh2
Jul 16 08:38:17 econome sshd[21516]: Disconnecting: Too many authentication failures for r.r from 125.123.24.78 port 33786 ssh2 [preauth]
Jul 16 08:38:17 econome sshd[21516]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.1........
-------------------------------
2019-07-16 22:09:13

Recently Reported IPs

132.226.245.85 168.228.71.134 50.116.9.28 178.90.40.87
70.182.8.51 77.243.88.139 192.241.217.249 211.252.54.217
193.233.90.205 149.18.29.78 152.32.233.14 2.181.30.66
122.176.27.63 193.233.140.206 178.35.177.242 5.181.170.58
213.108.2.13 83.97.117.197 193.233.90.181 185.14.192.193