Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.201.70.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40960
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.201.70.119.			IN	A

;; AUTHORITY SECTION:
.			321	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 04:44:39 CST 2022
;; MSG SIZE  rcvd: 107
Host info
119.70.201.149.in-addr.arpa domain name pointer BO04C-03102WS05.design.fh-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
119.70.201.149.in-addr.arpa	name = BO04C-03102WS05.design.fh-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
201.26.1.2 attack
Telnet/23 MH Probe, BF, Hack -
2019-09-30 23:30:50
42.116.255.216 attackbots
Sep 30 15:39:34 work-partkepr sshd\[6889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.116.255.216  user=root
Sep 30 15:39:36 work-partkepr sshd\[6889\]: Failed password for root from 42.116.255.216 port 33528 ssh2
...
2019-10-01 00:02:16
59.152.246.174 attackspam
445/tcp 445/tcp 445/tcp...
[2019-08-01/09-30]12pkt,1pt.(tcp)
2019-09-30 23:46:30
104.238.127.108 attack
xmlrpc attack
2019-09-30 23:48:16
66.8.77.10 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-08-01/09-30]11pkt,1pt.(tcp)
2019-09-30 23:35:05
51.15.87.74 attackbotsspam
ssh failed login
2019-09-30 23:54:06
62.4.28.247 attack
Sep 30 05:28:42 auw2 sshd\[8567\]: Invalid user ayesha from 62.4.28.247
Sep 30 05:28:42 auw2 sshd\[8567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.4.28.247
Sep 30 05:28:45 auw2 sshd\[8567\]: Failed password for invalid user ayesha from 62.4.28.247 port 54900 ssh2
Sep 30 05:32:59 auw2 sshd\[9001\]: Invalid user Samuli from 62.4.28.247
Sep 30 05:32:59 auw2 sshd\[9001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.4.28.247
2019-09-30 23:37:10
218.29.241.214 attackbotsspam
8999/tcp 8111/tcp
[2019-08-13/09-30]2pkt
2019-09-30 23:58:15
202.61.121.228 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-09-30 23:22:36
212.92.120.198 attackbots
RDP Bruteforce
2019-09-30 23:38:34
63.252.131.244 attack
445/tcp 445/tcp 445/tcp...
[2019-08-02/09-30]14pkt,1pt.(tcp)
2019-09-30 23:30:14
72.208.88.175 attackspam
" "
2019-10-01 00:02:45
108.179.219.114 attackspambots
Automatic report - XMLRPC Attack
2019-09-30 23:57:57
200.82.244.193 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-09-30 23:49:37
103.206.228.254 attackspam
$f2bV_matches
2019-09-30 23:50:52

Recently Reported IPs

255.135.14.19 207.194.238.251 116.138.239.39 89.170.68.90
54.168.40.144 155.118.145.190 184.250.173.211 33.31.2.20
6.153.46.238 99.126.216.126 51.182.197.133 46.132.156.20
169.47.201.218 41.180.162.203 157.121.98.74 227.144.63.254
170.27.56.100 67.176.80.239 185.10.68.87 232.226.164.237