Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.201.57.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4626
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.201.57.222.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 237 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 16:59:54 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 222.57.201.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 222.57.201.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.233.12.222 attackbots
2020-05-30T05:52:29.262237v22018076590370373 sshd[16111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.12.222
2020-05-30T05:52:29.257187v22018076590370373 sshd[16111]: Invalid user dwairiuko from 49.233.12.222 port 43978
2020-05-30T05:52:31.472002v22018076590370373 sshd[16111]: Failed password for invalid user dwairiuko from 49.233.12.222 port 43978 ssh2
2020-05-30T05:55:45.963226v22018076590370373 sshd[25183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.12.222  user=root
2020-05-30T05:55:47.746981v22018076590370373 sshd[25183]: Failed password for root from 49.233.12.222 port 38178 ssh2
...
2020-05-30 12:06:02
96.69.151.105 attack
Lines containing failures of 96.69.151.105
May 27 22:44:45 neweola sshd[9141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.69.151.105  user=r.r
May 27 22:44:47 neweola sshd[9141]: Failed password for r.r from 96.69.151.105 port 41620 ssh2
May 27 22:44:47 neweola sshd[9141]: Received disconnect from 96.69.151.105 port 41620:11: Bye Bye [preauth]
May 27 22:44:47 neweola sshd[9141]: Disconnected from authenticating user r.r 96.69.151.105 port 41620 [preauth]
May 27 22:53:34 neweola sshd[9507]: Invalid user admin from 96.69.151.105 port 42856
May 27 22:53:34 neweola sshd[9507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.69.151.105 
May 27 22:53:36 neweola sshd[9507]: Failed password for invalid user admin from 96.69.151.105 port 42856 ssh2
May 27 22:53:36 neweola sshd[9507]: Received disconnect from 96.69.151.105 port 42856:11: Bye Bye [preauth]
May 27 22:53:36 neweola sshd[9507]: ........
------------------------------
2020-05-30 08:44:52
122.51.56.205 attackspambots
May 30 05:11:15 gw1 sshd[20093]: Failed password for root from 122.51.56.205 port 59530 ssh2
May 30 05:16:30 gw1 sshd[20232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.56.205
...
2020-05-30 08:47:52
84.253.204.190 attackbots
WordPress brute force
2020-05-30 08:48:52
193.70.37.148 attackspambots
May 30 05:47:44 vmd17057 sshd[21183]: Failed password for root from 193.70.37.148 port 49224 ssh2
...
2020-05-30 12:07:40
178.250.220.99 attackspambots
IP 178.250.220.99 attacked honeypot on port: 1433 at 5/30/2020 4:55:03 AM
2020-05-30 12:03:51
138.197.5.191 attackspambots
May 29 23:09:35 l02a sshd[25421]: Invalid user plex from 138.197.5.191
May 29 23:09:35 l02a sshd[25421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.5.191 
May 29 23:09:35 l02a sshd[25421]: Invalid user plex from 138.197.5.191
May 29 23:09:38 l02a sshd[25421]: Failed password for invalid user plex from 138.197.5.191 port 57704 ssh2
2020-05-30 08:28:15
103.97.209.55 attackbotsspam
Attempted connection to port 3306.
2020-05-30 08:43:10
181.63.248.149 attackbots
May 29 20:51:04 dignus sshd[16595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.63.248.149  user=uucp
May 29 20:51:06 dignus sshd[16595]: Failed password for uucp from 181.63.248.149 port 50884 ssh2
May 29 20:55:09 dignus sshd[16811]: Invalid user dpetty from 181.63.248.149 port 52994
May 29 20:55:09 dignus sshd[16811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.63.248.149
May 29 20:55:11 dignus sshd[16811]: Failed password for invalid user dpetty from 181.63.248.149 port 52994 ssh2
...
2020-05-30 12:00:44
118.171.135.158 attack
Attempted connection to port 445.
2020-05-30 08:41:14
181.226.73.219 attack
Unauthorized connection attempt from IP address 181.226.73.219 on Port 445(SMB)
2020-05-30 08:52:58
84.51.217.198 attackspambots
Unauthorized connection attempt from IP address 84.51.217.198 on Port 445(SMB)
2020-05-30 08:30:16
200.93.28.220 attackbots
Attempted connection to port 445.
2020-05-30 08:33:13
37.212.83.89 attack
[portscan] Port scan
2020-05-30 12:03:19
177.220.133.158 attackbots
May 30 05:56:16 inter-technics sshd[24881]: Invalid user hudson from 177.220.133.158 port 33273
May 30 05:56:16 inter-technics sshd[24881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.220.133.158
May 30 05:56:16 inter-technics sshd[24881]: Invalid user hudson from 177.220.133.158 port 33273
May 30 05:56:18 inter-technics sshd[24881]: Failed password for invalid user hudson from 177.220.133.158 port 33273 ssh2
May 30 06:00:27 inter-technics sshd[25100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.220.133.158  user=root
May 30 06:00:29 inter-technics sshd[25100]: Failed password for root from 177.220.133.158 port 35941 ssh2
...
2020-05-30 12:04:18

Recently Reported IPs

18.243.163.71 130.66.231.244 205.244.212.179 223.240.187.100
88.230.117.182 189.213.201.125 223.26.164.241 4.152.135.34
95.4.241.5 247.58.1.252 36.162.233.242 117.122.44.30
203.146.123.71 244.150.151.90 214.107.37.191 139.32.234.232
248.10.185.112 207.85.136.190 201.68.11.225 92.93.231.93