Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.207.108.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35953
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.207.108.157.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011001 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 11 10:18:26 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 157.108.207.149.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 157.108.207.149.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
93.190.217.54 attack
Received: from host-93.190.217.54.routergate.com (HELO topsawanimal.top) (93.190.217.54)
2019-08-30 14:16:44
5.199.130.188 attackspam
Aug 29 19:54:25 lcdev sshd\[9356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor.piratenpartei-nrw.de  user=root
Aug 29 19:54:27 lcdev sshd\[9356\]: Failed password for root from 5.199.130.188 port 39294 ssh2
Aug 29 19:54:38 lcdev sshd\[9356\]: Failed password for root from 5.199.130.188 port 39294 ssh2
Aug 29 19:54:41 lcdev sshd\[9356\]: Failed password for root from 5.199.130.188 port 39294 ssh2
Aug 29 19:55:27 lcdev sshd\[9453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor.piratenpartei-nrw.de  user=root
2019-08-30 14:03:36
206.189.137.113 attackspambots
Aug 30 08:12:44 pornomens sshd\[22983\]: Invalid user srvadmin from 206.189.137.113 port 44730
Aug 30 08:12:44 pornomens sshd\[22983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.137.113
Aug 30 08:12:46 pornomens sshd\[22983\]: Failed password for invalid user srvadmin from 206.189.137.113 port 44730 ssh2
...
2019-08-30 14:19:30
51.158.74.14 attackspam
Aug 30 05:14:02 web8 sshd\[17595\]: Invalid user mktg2 from 51.158.74.14
Aug 30 05:14:02 web8 sshd\[17595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.74.14
Aug 30 05:14:04 web8 sshd\[17595\]: Failed password for invalid user mktg2 from 51.158.74.14 port 41108 ssh2
Aug 30 05:17:56 web8 sshd\[19626\]: Invalid user bitnami from 51.158.74.14
Aug 30 05:17:56 web8 sshd\[19626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.74.14
2019-08-30 13:24:26
70.168.93.204 attackbots
Attempt to login to email server on IMAP service on 30-08-2019 06:49:39.
2019-08-30 14:13:55
45.79.179.48 attackspambots
firewall-block, port(s): 5683/udp
2019-08-30 13:55:11
206.189.166.172 attackspambots
[ssh] SSH attack
2019-08-30 14:06:06
177.184.247.49 attack
Aug 30 01:49:34 web1 postfix/smtpd[7224]: warning: unknown[177.184.247.49]: SASL PLAIN authentication failed: authentication failure
...
2019-08-30 14:18:39
119.40.33.22 attackbots
Aug 29 23:19:35 icinga sshd[32499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.40.33.22
Aug 29 23:19:38 icinga sshd[32499]: Failed password for invalid user docker from 119.40.33.22 port 41328 ssh2
...
2019-08-30 13:18:43
36.156.24.43 attackspam
$f2bV_matches
2019-08-30 14:03:08
128.199.240.120 attackbots
Invalid user docker from 128.199.240.120 port 38668
2019-08-30 13:16:57
101.109.119.58 attackspam
SMB Server BruteForce Attack
2019-08-30 13:19:50
81.12.111.2 attack
$f2bV_matches
2019-08-30 13:21:44
60.212.42.56 attackbots
[munged]::443 60.212.42.56 - - [30/Aug/2019:06:01:24 +0200] "POST /[munged]: HTTP/1.1" 200 9055 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 60.212.42.56 - - [30/Aug/2019:06:01:26 +0200] "POST /[munged]: HTTP/1.1" 200 4394 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 60.212.42.56 - - [30/Aug/2019:06:01:29 +0200] "POST /[munged]: HTTP/1.1" 200 4394 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 60.212.42.56 - - [30/Aug/2019:06:01:32 +0200] "POST /[munged]: HTTP/1.1" 200 4394 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 60.212.42.56 - - [30/Aug/2019:06:01:34 +0200] "POST /[munged]: HTTP/1.1" 200 4394 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 60.212.42.56 - - [30/Aug/2019:06:01:36 +0200]
2019-08-30 13:46:58
187.8.159.140 attackspam
(sshd) Failed SSH login from 187.8.159.140 (BR/Brazil/187-8-159-140.customer.tdatabrasil.net.br): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 30 01:37:53 testbed sshd[30072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.8.159.140  user=mysql
Aug 30 01:37:56 testbed sshd[30072]: Failed password for mysql from 187.8.159.140 port 50497 ssh2
Aug 30 01:44:17 testbed sshd[30506]: Invalid user deployer from 187.8.159.140 port 49466
Aug 30 01:44:19 testbed sshd[30506]: Failed password for invalid user deployer from 187.8.159.140 port 49466 ssh2
Aug 30 01:49:38 testbed sshd[30871]: Invalid user test from 187.8.159.140 port 44574
2019-08-30 14:12:40

Recently Reported IPs

54.13.3.40 146.90.248.39 147.91.139.0 159.187.12.18
86.80.143.26 250.133.127.93 240.226.78.169 124.232.120.241
4.215.114.33 87.162.61.56 28.83.133.68 227.86.1.78
18.27.138.241 237.233.168.72 74.222.65.56 120.180.248.170
249.218.248.221 254.84.59.179 25.209.241.255 93.248.69.192