Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.19.242.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13558
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.19.242.71.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 03:42:41 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 71.242.19.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 71.242.19.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
176.122.129.114 attack
$f2bV_matches
2020-08-17 04:14:32
23.90.29.108 attackbotsspam
Nil
2020-08-17 04:17:26
149.56.130.61 attackspambots
Aug 16 13:30:38 dignus sshd[17396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.130.61  user=root
Aug 16 13:30:40 dignus sshd[17396]: Failed password for root from 149.56.130.61 port 58866 ssh2
Aug 16 13:34:20 dignus sshd[17954]: Invalid user newuser from 149.56.130.61 port 39690
Aug 16 13:34:20 dignus sshd[17954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.130.61
Aug 16 13:34:22 dignus sshd[17954]: Failed password for invalid user newuser from 149.56.130.61 port 39690 ssh2
...
2020-08-17 04:42:54
14.115.28.101 attackbots
$f2bV_matches
2020-08-17 04:41:12
142.93.35.169 attack
142.93.35.169 - - [16/Aug/2020:21:34:27 +0100] "POST /wp-login.php HTTP/1.1" 200 1802 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.35.169 - - [16/Aug/2020:21:34:28 +0100] "POST /wp-login.php HTTP/1.1" 200 1799 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.35.169 - - [16/Aug/2020:21:34:34 +0100] "POST /wp-login.php HTTP/1.1" 200 1801 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-17 04:37:52
46.105.123.181 attackspambots
"OS File Access Attempt - Matched Data: wp-config.php found within ARGS:item: wp-config.php"
2020-08-17 04:15:05
66.58.181.13 attackbotsspam
Aug 16 21:10:31 marvibiene sshd[6704]: Failed password for root from 66.58.181.13 port 38172 ssh2
Aug 16 21:21:24 marvibiene sshd[7598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.58.181.13 
Aug 16 21:21:26 marvibiene sshd[7598]: Failed password for invalid user jackson from 66.58.181.13 port 59056 ssh2
2020-08-17 04:15:31
218.92.0.190 attackbots
Aug 16 22:18:13 dcd-gentoo sshd[23404]: User root from 218.92.0.190 not allowed because none of user's groups are listed in AllowGroups
Aug 16 22:18:15 dcd-gentoo sshd[23404]: error: PAM: Authentication failure for illegal user root from 218.92.0.190
Aug 16 22:18:15 dcd-gentoo sshd[23404]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.190 port 58141 ssh2
...
2020-08-17 04:19:00
58.87.78.80 attack
Aug 16 21:52:45 [host] sshd[28452]: pam_unix(sshd:
Aug 16 21:52:48 [host] sshd[28452]: Failed passwor
Aug 16 22:00:58 [host] sshd[28671]: Invalid user g
2020-08-17 04:21:11
34.73.15.205 attackspambots
Aug 16 22:30:52 minden010 sshd[22895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.73.15.205
Aug 16 22:30:54 minden010 sshd[22895]: Failed password for invalid user ftp from 34.73.15.205 port 33878 ssh2
Aug 16 22:34:16 minden010 sshd[23595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.73.15.205
...
2020-08-17 04:50:05
5.188.84.228 attack
tried to spam in our blog comments: Launch the financial Robot and do your business. 
Link - - url_detected:tinyurl dot com/y7t5j7yc
2020-08-17 04:12:46
164.132.48.179 attack
xmlrpc attack
2020-08-17 04:20:19
183.6.107.248 attackspambots
Aug 16 17:23:19 funkybot sshd[25291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.6.107.248 
Aug 16 17:23:22 funkybot sshd[25291]: Failed password for invalid user rack from 183.6.107.248 port 38660 ssh2
...
2020-08-17 04:13:14
39.109.223.10 attackspambots
Unauthorised access (Aug 16) SRC=39.109.223.10 LEN=40 TTL=50 ID=34540 TCP DPT=23 WINDOW=42353 SYN
2020-08-17 04:43:10
142.44.242.38 attackbots
Aug 16 15:40:50 cp sshd[23226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.242.38
2020-08-17 04:26:30

Recently Reported IPs

224.229.239.240 141.174.225.151 229.255.157.6 68.5.20.172
150.208.181.211 223.147.2.193 181.49.220.20 215.133.57.192
107.174.93.241 91.187.153.83 250.203.5.142 54.226.198.57
255.106.12.219 161.186.121.158 133.194.30.148 57.183.193.170
123.91.166.190 206.12.9.114 113.36.49.30 239.74.166.104