Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.2.12.198
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36505
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.2.12.198.			IN	A

;; AUTHORITY SECTION:
.			564	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 117 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 03:05:09 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 198.12.2.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 198.12.2.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.61.57.226 attackspam
Dec 19 20:05:20 v22018076622670303 sshd\[21377\]: Invalid user latta from 182.61.57.226 port 16731
Dec 19 20:05:20 v22018076622670303 sshd\[21377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.57.226
Dec 19 20:05:21 v22018076622670303 sshd\[21377\]: Failed password for invalid user latta from 182.61.57.226 port 16731 ssh2
...
2019-12-20 04:24:08
119.149.149.75 attackspambots
Invalid user usuario from 119.149.149.75 port 34412
2019-12-20 04:30:53
49.49.237.141 attackspambots
Dec 19 19:28:10 XXX sshd[18842]: Invalid user admin from 49.49.237.141 port 52516
2019-12-20 04:27:04
68.183.89.68 attack
Dec 19 17:16:29 vps691689 sshd[30231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.89.68
Dec 19 17:16:32 vps691689 sshd[30231]: Failed password for invalid user indicom from 68.183.89.68 port 43182 ssh2
...
2019-12-20 04:39:18
45.40.166.142 attack
Automatic report - XMLRPC Attack
2019-12-20 04:22:57
212.0.149.87 attack
Port scan on 1 port(s): 445
2019-12-20 04:14:26
80.82.78.100 attackbots
80.82.78.100 was recorded 38 times by 30 hosts attempting to connect to the following ports: 1088,1157,1541. Incident counter (4h, 24h, all-time): 38, 376, 13477
2019-12-20 04:20:38
212.64.100.229 attackspambots
Dec 19 19:50:38 *** sshd[32268]: Invalid user wilhelmus from 212.64.100.229
2019-12-20 04:27:16
80.87.216.126 attack
Telnet/23 MH Probe, BF, Hack -
2019-12-20 04:19:26
122.51.36.240 attack
Invalid user trutna from 122.51.36.240 port 56750
2019-12-20 04:23:38
101.109.83.140 attack
SSH Brute Force, server-1 sshd[26108]: Failed password for invalid user porcher from 101.109.83.140 port 52536 ssh2
2019-12-20 04:11:53
188.254.18.110 attackbots
[WP scan/spam/exploit]
[multiweb: req 7 domains(hosts/ip)]
[bad UserAgent]
Blocklist.DE:"listed [bruteforcelogin]"
2019-12-20 04:47:07
67.205.135.65 attack
SSH invalid-user multiple login try
2019-12-20 04:48:42
81.242.53.21 attackspambots
Dec 19 16:22:49 server010 sshd[20356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.242.53.21  user=r.r
Dec 19 16:22:51 server010 sshd[20356]: Failed password for r.r from 81.242.53.21 port 22303 ssh2
Dec 19 16:28:19 server010 sshd[20596]: Invalid user abdulkaf from 81.242.53.21
Dec 19 16:28:19 server010 sshd[20596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.242.53.21
Dec 19 16:28:21 server010 sshd[20596]: Failed password for invalid user abdulkaf from 81.242.53.21 port 17071 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=81.242.53.21
2019-12-20 04:20:18
106.75.103.35 attack
Dec  6 10:13:37 localhost sshd\[12634\]: Invalid user zori from 106.75.103.35 port 35254
Dec  6 10:13:37 localhost sshd\[12634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.103.35
Dec  6 10:13:39 localhost sshd\[12634\]: Failed password for invalid user zori from 106.75.103.35 port 35254 ssh2
Dec  6 10:21:09 localhost sshd\[12696\]: Invalid user ms from 106.75.103.35 port 38572
2019-12-20 04:17:15

Recently Reported IPs

104.16.96.4 104.16.97.50 104.16.97.71 104.16.98.131
104.16.98.44 104.16.98.50 104.16.98.71 104.160.180.142
104.160.180.153 104.160.180.161 104.160.180.60 104.160.180.61
104.160.180.9 104.160.23.253 104.160.247.23 104.160.26.68
104.160.26.95 104.160.64.67 104.160.67.72 104.160.73.142