Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.185.81.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13432
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.185.81.161.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 15:18:02 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 161.81.185.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 161.81.185.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.101.33.136 attackspambots
Masscan Port Scanning Tool Detection
2019-09-04 01:06:36
103.8.149.78 attackspambots
$f2bV_matches
2019-09-04 01:57:29
101.109.106.122 attack
Unauthorized connection attempt from IP address 101.109.106.122 on Port 445(SMB)
2019-09-04 01:55:38
180.241.150.142 attackbotsspam
Unauthorized connection attempt from IP address 180.241.150.142 on Port 445(SMB)
2019-09-04 01:24:09
14.167.166.43 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-03 09:18:53,245 INFO [amun_request_handler] PortScan Detected on Port: 445 (14.167.166.43)
2019-09-04 01:27:28
116.103.176.124 attackspam
Unauthorized connection attempt from IP address 116.103.176.124 on Port 445(SMB)
2019-09-04 01:53:02
45.115.99.38 attack
Sep  3 19:07:58 icinga sshd[18350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.115.99.38
Sep  3 19:08:00 icinga sshd[18350]: Failed password for invalid user senta from 45.115.99.38 port 35271 ssh2
...
2019-09-04 01:53:38
14.229.120.251 attack
Unauthorized connection attempt from IP address 14.229.120.251 on Port 445(SMB)
2019-09-04 01:21:35
195.85.246.11 attackspam
2019-09-03T10:01:30.117669mail01 postfix/smtpd[13888]: warning: externalservers.aspex.be[195.85.246.11]: SASL login authentication failed: UGFzc3dvcmQ6
2019-09-03T10:02:32.221785mail01 postfix/smtpd[14656]: warning: externalservers.aspex.be[195.85.246.11]: SASL login authentication failed: UGFzc3dvcmQ6
2019-09-03T10:03:20.245989mail01 postfix/smtpd[13888]: warning: externalservers.aspex.be[195.85.246.11]: SASL login authentication failed: UGFzc3dvcmQ6
2019-09-04 01:05:12
138.68.94.173 attackspam
Sep  2 22:30:53 lcdev sshd\[25388\]: Invalid user qazwsx from 138.68.94.173
Sep  2 22:30:53 lcdev sshd\[25388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.94.173
Sep  2 22:30:55 lcdev sshd\[25388\]: Failed password for invalid user qazwsx from 138.68.94.173 port 41932 ssh2
Sep  2 22:36:18 lcdev sshd\[25864\]: Invalid user move from 138.68.94.173
Sep  2 22:36:18 lcdev sshd\[25864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.94.173
2019-09-04 01:45:44
36.67.59.189 attack
Unauthorized connection attempt from IP address 36.67.59.189 on Port 445(SMB)
2019-09-04 01:47:55
49.88.112.116 attackspam
2019-09-03T11:33:11.173294abusebot.cloudsearch.cf sshd\[6192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.116  user=root
2019-09-04 01:46:55
183.48.34.77 attackbotsspam
Sep  3 10:02:41 cp sshd[9744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.48.34.77
2019-09-04 01:51:01
115.75.38.12 attack
Unauthorized connection attempt from IP address 115.75.38.12 on Port 445(SMB)
2019-09-04 01:48:31
51.79.20.92 attackspam
Calling not existent HTTP content (400 or 404).
2019-09-04 01:18:59

Recently Reported IPs

33.35.1.232 190.110.139.185 186.37.121.89 43.177.45.252
99.37.102.68 67.174.211.114 159.94.15.185 210.160.117.57
138.86.227.49 93.98.20.16 65.56.48.246 116.61.235.10
152.4.167.105 5.194.139.143 162.194.16.36 210.227.5.242
95.207.150.172 25.137.77.33 203.243.227.132 127.90.123.117