Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.192.85.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48882
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.192.85.18.			IN	A

;; AUTHORITY SECTION:
.			353	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010101 1800 900 604800 86400

;; Query time: 80 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 02 09:12:34 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 18.85.192.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.85.192.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
96.44.132.86 attackbots
Brute forcing email accounts
2020-02-13 22:09:00
114.113.126.163 attackbotsspam
Feb 13 14:10:04 Invalid user postgres from 114.113.126.163 port 60521
2020-02-13 21:49:49
174.219.135.182 attack
Brute forcing email accounts
2020-02-13 22:25:51
113.22.10.128 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 13-02-2020 13:50:09.
2020-02-13 22:24:45
196.179.234.99 attackspam
Feb 13 08:49:33 plusreed sshd[29585]: Invalid user tarin from 196.179.234.99
...
2020-02-13 22:15:44
45.40.217.146 attack
ICMP MH Probe, Scan /Distributed -
2020-02-13 21:52:21
77.120.120.29 attackspambots
Feb 13 14:49:44  exim[29286]: [1\70] 1j2Es8-0007cM-QO H=(pandora.ua) [77.120.120.29] X=TLS1.0:RSA_AES_256_CBC_SHA1:256 CV=no F= rejected after DATA: This message scored 26.1 spam points.
2020-02-13 22:30:03
42.156.252.34 attackbots
ICMP MH Probe, Scan /Distributed -
2020-02-13 22:19:57
142.4.204.122 attack
Feb 13 09:23:29 plusreed sshd[5827]: Invalid user saporita from 142.4.204.122
...
2020-02-13 22:27:45
64.113.126.194 attackbots
Telnet/23 MH Probe, BF, Hack -
2020-02-13 22:17:20
173.68.8.230 attackspam
tcp 5555
2020-02-13 22:27:25
80.66.81.36 attackbots
Feb 13 14:58:19 relay postfix/smtpd\[12262\]: warning: unknown\[80.66.81.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 13 15:01:09 relay postfix/smtpd\[12105\]: warning: unknown\[80.66.81.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 13 15:01:33 relay postfix/smtpd\[7871\]: warning: unknown\[80.66.81.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 13 15:05:16 relay postfix/smtpd\[7771\]: warning: unknown\[80.66.81.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 13 15:05:40 relay postfix/smtpd\[7871\]: warning: unknown\[80.66.81.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-02-13 22:18:21
62.38.252.137 attackspambots
Telnet/23 MH Probe, BF, Hack -
2020-02-13 22:30:33
194.44.93.142 attackbots
Automatic report - XMLRPC Attack
2020-02-13 22:05:26
95.66.211.173 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 13-02-2020 13:50:11.
2020-02-13 22:21:53

Recently Reported IPs

239.106.17.128 37.11.33.157 183.198.218.195 174.147.144.171
186.130.176.169 25.141.53.3 86.199.140.31 134.133.170.172
252.241.206.237 40.8.25.171 75.223.104.105 248.244.19.101
98.219.27.98 240.251.207.82 131.1.79.180 51.34.13.48
208.237.145.105 198.69.15.72 14.110.21.147 25.204.42.21