Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.20.187.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39954
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.20.187.20.			IN	A

;; AUTHORITY SECTION:
.			33	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010100 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 01 23:41:21 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 20.187.20.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.187.20.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.44.85.18 attack
Unauthorized connection attempt from IP address 187.44.85.18 on Port 445(SMB)
2019-11-11 07:50:15
171.4.181.29 attackspam
Unauthorized connection attempt from IP address 171.4.181.29 on Port 445(SMB)
2019-11-11 07:52:52
165.227.77.120 attackspam
Nov 10 22:00:50 srv01 sshd[3219]: Invalid user ident from 165.227.77.120
Nov 10 22:00:50 srv01 sshd[3219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.77.120
Nov 10 22:00:50 srv01 sshd[3219]: Invalid user ident from 165.227.77.120
Nov 10 22:00:52 srv01 sshd[3219]: Failed password for invalid user ident from 165.227.77.120 port 49669 ssh2
Nov 10 22:04:13 srv01 sshd[3447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.77.120  user=nginx
Nov 10 22:04:15 srv01 sshd[3447]: Failed password for nginx from 165.227.77.120 port 39817 ssh2
...
2019-11-11 07:28:23
201.146.13.90 attackspam
Unauthorized connection attempt from IP address 201.146.13.90 on Port 445(SMB)
2019-11-11 07:27:08
49.235.33.73 attack
Nov 10 12:56:30 firewall sshd[28740]: Failed password for invalid user alex from 49.235.33.73 port 49206 ssh2
Nov 10 13:01:08 firewall sshd[28917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.33.73  user=root
Nov 10 13:01:10 firewall sshd[28917]: Failed password for root from 49.235.33.73 port 49374 ssh2
...
2019-11-11 07:45:00
105.226.96.120 attackbots
Unauthorized connection attempt from IP address 105.226.96.120 on Port 445(SMB)
2019-11-11 07:59:45
86.98.46.155 attackspam
19/11/10@11:01:15: FAIL: Alarm-Intrusion address from=86.98.46.155
...
2019-11-11 07:37:07
120.192.201.22 attack
Brute force attempt
2019-11-11 07:34:10
139.155.84.213 attackbotsspam
$f2bV_matches
2019-11-11 07:47:37
41.33.119.67 attackbotsspam
Nov 11 00:07:41 vmanager6029 sshd\[8469\]: Invalid user wwwadmin from 41.33.119.67 port 5994
Nov 11 00:07:41 vmanager6029 sshd\[8469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.33.119.67
Nov 11 00:07:43 vmanager6029 sshd\[8469\]: Failed password for invalid user wwwadmin from 41.33.119.67 port 5994 ssh2
2019-11-11 07:55:17
112.85.42.94 attack
Nov 10 18:02:02 xentho sshd[22967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.94  user=root
Nov 10 18:02:05 xentho sshd[22967]: Failed password for root from 112.85.42.94 port 10659 ssh2
Nov 10 18:02:06 xentho sshd[22967]: Failed password for root from 112.85.42.94 port 10659 ssh2
Nov 10 18:02:02 xentho sshd[22967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.94  user=root
Nov 10 18:02:05 xentho sshd[22967]: Failed password for root from 112.85.42.94 port 10659 ssh2
Nov 10 18:02:06 xentho sshd[22967]: Failed password for root from 112.85.42.94 port 10659 ssh2
Nov 10 18:02:02 xentho sshd[22967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.94  user=root
Nov 10 18:02:05 xentho sshd[22967]: Failed password for root from 112.85.42.94 port 10659 ssh2
Nov 10 18:02:06 xentho sshd[22967]: Failed password for root from 112.85.42.94 po
...
2019-11-11 07:35:48
193.193.244.196 attackbotsspam
Honeypot attack, port: 445, PTR: mail.kam.asdc.kz.
2019-11-11 07:39:26
59.63.208.54 attackbotsspam
Invalid user alex from 59.63.208.54 port 57580
2019-11-11 07:26:19
45.184.186.17 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-11 07:57:46
185.8.181.42 attackspam
Unauthorized connection attempt from IP address 185.8.181.42 on Port 445(SMB)
2019-11-11 07:33:42

Recently Reported IPs

241.55.126.115 45.228.8.46 140.135.95.135 116.254.52.75
225.65.8.19 149.20.187.180 249.206.200.10 78.168.8.31
3.162.139.106 96.67.227.248 119.3.190.89 37.5.12.93
183.189.56.237 86.98.226.29 31.55.93.21 249.104.197.155
53.133.28.176 205.38.191.179 250.103.9.86 74.203.183.11