Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.199.76.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52770
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.199.76.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:01:18 CST 2025
;; MSG SIZE  rcvd: 107
Host info
142.76.199.149.in-addr.arpa domain name pointer unknown-76-142.xilinx.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.76.199.149.in-addr.arpa	name = unknown-76-142.xilinx.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
117.200.64.199 attackbots
Invalid user admin from 117.200.64.199 port 41698
2020-06-06 01:35:53
213.6.130.133 attack
Invalid user admin1 from 213.6.130.133 port 50458
2020-06-06 01:59:32
123.21.123.199 attackspam
Invalid user admin from 123.21.123.199 port 51937
2020-06-06 01:33:29
106.12.13.247 attack
Invalid user 22 from 106.12.13.247 port 58728
2020-06-06 01:42:56
212.64.29.78 attack
Brute-force attempt banned
2020-06-06 02:00:08
107.180.238.240 attack
Invalid user admin from 107.180.238.240 port 34976
2020-06-06 01:41:29
14.169.224.192 attack
Invalid user admin from 14.169.224.192 port 55812
2020-06-06 01:55:50
49.232.155.37 attackspam
2020-06-05T05:48:06.834583ns386461 sshd\[2393\]: Invalid user testuser12 from 49.232.155.37 port 39062
2020-06-05T05:48:06.839018ns386461 sshd\[2393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.155.37
2020-06-05T05:48:08.568673ns386461 sshd\[2393\]: Failed password for invalid user testuser12 from 49.232.155.37 port 39062 ssh2
2020-06-05T14:35:17.517742ns386461 sshd\[29247\]: Invalid user testuser from 49.232.155.37 port 36712
2020-06-05T14:35:17.522487ns386461 sshd\[29247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.155.37
...
2020-06-06 01:50:01
41.202.166.215 attackspambots
Invalid user admin from 41.202.166.215 port 46967
2020-06-06 01:51:30
45.84.196.236 attack
Invalid user ubnt from 45.84.196.236 port 44338
2020-06-06 01:50:40
84.214.110.106 attackbots
Invalid user admin from 84.214.110.106 port 46387
2020-06-06 01:45:42
68.5.173.208 attackbots
5x Failed Password
2020-06-06 01:45:56
14.169.207.209 attack
Invalid user admin from 14.169.207.209 port 43484
2020-06-06 01:56:27
14.182.5.126 attackspam
Invalid user admin from 14.182.5.126 port 47551
2020-06-06 01:55:29
41.34.196.83 attack
Invalid user admin from 41.34.196.83 port 39076
2020-06-06 01:53:03

Recently Reported IPs

228.133.120.52 22.180.60.253 23.244.71.246 81.82.89.244
114.200.222.82 202.153.188.161 203.3.88.175 165.130.243.184
206.157.28.240 12.227.51.183 39.19.171.25 50.90.174.86
136.56.233.101 81.179.145.166 133.156.140.39 32.62.215.118
181.135.47.40 107.123.3.195 149.227.179.105 246.81.195.145