Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.19.134.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43842
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;149.19.134.73.			IN	A

;; AUTHORITY SECTION:
.			396	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122901 1800 900 604800 86400

;; Query time: 133 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 30 03:30:10 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 73.134.19.149.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 73.134.19.149.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
85.58.121.83 attack
Automatic report - XMLRPC Attack
2019-12-08 22:56:14
129.204.78.236 attackspambots
2019-12-08T14:23:04.815232abusebot.cloudsearch.cf sshd\[23591\]: Invalid user mago from 129.204.78.236 port 36076
2019-12-08 22:50:48
111.204.101.247 attackspam
2019-12-08T14:19:29.435117abusebot-4.cloudsearch.cf sshd\[14740\]: Invalid user piano from 111.204.101.247 port 18306
2019-12-08 22:51:06
2a00:c380:c0de:0:5054:ff:fe7e:d742 attackbots
T: f2b postfix aggressive 3x
2019-12-08 22:31:34
111.231.201.103 attack
Dec  8 07:24:22 vmd17057 sshd\[12335\]: Invalid user cn from 111.231.201.103 port 42656
Dec  8 07:24:22 vmd17057 sshd\[12335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.201.103
Dec  8 07:24:24 vmd17057 sshd\[12335\]: Failed password for invalid user cn from 111.231.201.103 port 42656 ssh2
...
2019-12-08 22:52:58
49.232.92.95 attackbotsspam
2019-12-08T02:02:18.018980-07:00 suse-nuc sshd[19521]: Invalid user squid from 49.232.92.95 port 56350
...
2019-12-08 22:27:48
217.182.158.104 attack
Dec  8 12:39:25 minden010 sshd[25779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.158.104
Dec  8 12:39:28 minden010 sshd[25779]: Failed password for invalid user bbbbbbb from 217.182.158.104 port 45017 ssh2
Dec  8 12:44:42 minden010 sshd[28976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.158.104
...
2019-12-08 22:39:50
60.30.92.46 attack
Honeypot hit.
2019-12-08 22:41:05
106.12.99.233 attackspambots
Dec  8 14:50:35 h2177944 sshd\[29689\]: Invalid user server from 106.12.99.233 port 19159
Dec  8 14:50:35 h2177944 sshd\[29689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.99.233
Dec  8 14:50:37 h2177944 sshd\[29689\]: Failed password for invalid user server from 106.12.99.233 port 19159 ssh2
Dec  8 14:57:58 h2177944 sshd\[29964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.99.233  user=root
...
2019-12-08 22:38:53
158.69.220.70 attackspambots
Dec  8 15:51:02 meumeu sshd[23999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.220.70 
Dec  8 15:51:04 meumeu sshd[23999]: Failed password for invalid user test from 158.69.220.70 port 53620 ssh2
Dec  8 15:56:30 meumeu sshd[24971]: Failed password for root from 158.69.220.70 port 34034 ssh2
...
2019-12-08 23:04:09
168.167.30.198 attack
Dec  8 08:27:11 srv01 sshd[8359]: Invalid user sakseid from 168.167.30.198 port 56084
Dec  8 08:27:11 srv01 sshd[8359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.167.30.198
Dec  8 08:27:11 srv01 sshd[8359]: Invalid user sakseid from 168.167.30.198 port 56084
Dec  8 08:27:13 srv01 sshd[8359]: Failed password for invalid user sakseid from 168.167.30.198 port 56084 ssh2
Dec  8 08:35:42 srv01 sshd[9199]: Invalid user ftp from 168.167.30.198 port 53796
...
2019-12-08 22:37:26
49.233.155.23 attackbotsspam
Dec  8 12:36:31 microserver sshd[2316]: Invalid user unger from 49.233.155.23 port 54518
Dec  8 12:36:31 microserver sshd[2316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.155.23
Dec  8 12:36:33 microserver sshd[2316]: Failed password for invalid user unger from 49.233.155.23 port 54518 ssh2
Dec  8 12:43:18 microserver sshd[3194]: Invalid user gingham from 49.233.155.23 port 43362
Dec  8 12:43:18 microserver sshd[3194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.155.23
Dec  8 12:55:28 microserver sshd[5189]: Invalid user layher from 49.233.155.23 port 49282
Dec  8 12:55:28 microserver sshd[5189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.155.23
Dec  8 12:55:30 microserver sshd[5189]: Failed password for invalid user layher from 49.233.155.23 port 49282 ssh2
Dec  8 13:02:07 microserver sshd[6067]: Invalid user root3333 from 49.233.155.23 port 38128
Dec  8
2019-12-08 22:47:02
104.248.197.40 attackbotsspam
Dec  7 22:09:31 ahost sshd[2920]: reveeclipse mapping checking getaddrinfo for 217132.cloudwaysapps.com [104.248.197.40] failed - POSSIBLE BREAK-IN ATTEMPT!
Dec  7 22:09:31 ahost sshd[2920]: Invalid user webadmin from 104.248.197.40
Dec  7 22:09:31 ahost sshd[2920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.197.40 
Dec  7 22:09:32 ahost sshd[2920]: Failed password for invalid user webadmin from 104.248.197.40 port 58236 ssh2
Dec  7 22:09:32 ahost sshd[2920]: Received disconnect from 104.248.197.40: 11: Bye Bye [preauth]
Dec  7 22:16:34 ahost sshd[3616]: reveeclipse mapping checking getaddrinfo for 217132.cloudwaysapps.com [104.248.197.40] failed - POSSIBLE BREAK-IN ATTEMPT!
Dec  7 22:16:34 ahost sshd[3616]: Invalid user ipnms from 104.248.197.40
Dec  7 22:16:34 ahost sshd[3616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.197.40 
Dec  7 22:16:37 ahost sshd[3616]: Fai........
------------------------------
2019-12-08 22:54:33
202.51.74.189 attackspambots
Dec  8 09:32:55 vps647732 sshd[23447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.74.189
Dec  8 09:32:57 vps647732 sshd[23447]: Failed password for invalid user minck from 202.51.74.189 port 48500 ssh2
...
2019-12-08 22:48:04
188.35.20.144 attackspambots
[portscan] Port scan
2019-12-08 22:44:34

Recently Reported IPs

64.180.131.194 175.175.92.254 157.100.224.143 42.55.186.11
187.171.79.228 237.54.12.212 134.117.77.181 143.202.189.168
98.75.149.219 156.136.0.213 121.146.19.166 157.195.168.55
101.163.121.68 61.77.18.211 117.15.95.110 115.220.190.167
110.80.155.108 108.230.165.0 185.61.231.198 220.227.159.232