Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.21.130.153
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24007
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.21.130.153.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 12:15:39 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 153.130.21.149.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 149.21.130.153.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
96.84.165.99 attackbots
Honeypot attack, port: 23, PTR: 96-84-165-99-static.hfc.comcastbusiness.net.
2019-08-26 16:51:14
37.49.231.121 attackspambots
*Port Scan* detected from 37.49.231.121 (NL/Netherlands/-). 4 hits in the last 15 seconds
2019-08-26 16:15:10
62.75.152.213 attack
Aug 18 19:47:30 vpxxxxxxx22308 sshd[13793]: Invalid user server from 62.75.152.213
Aug 18 19:47:30 vpxxxxxxx22308 sshd[13793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.75.152.213
Aug 18 19:47:33 vpxxxxxxx22308 sshd[13793]: Failed password for invalid user server from 62.75.152.213 port 49908 ssh2
Aug 18 19:51:31 vpxxxxxxx22308 sshd[14856]: Invalid user xapolicymgr from 62.75.152.213
Aug 18 19:51:31 vpxxxxxxx22308 sshd[14856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.75.152.213
Aug 18 19:51:33 vpxxxxxxx22308 sshd[14856]: Failed password for invalid user xapolicymgr from 62.75.152.213 port 43608 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=62.75.152.213
2019-08-26 16:37:33
113.194.90.28 attack
Aug 25 21:53:44 friendsofhawaii sshd\[1335\]: Invalid user ck from 113.194.90.28
Aug 25 21:53:44 friendsofhawaii sshd\[1335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.194.90.28
Aug 25 21:53:46 friendsofhawaii sshd\[1335\]: Failed password for invalid user ck from 113.194.90.28 port 56842 ssh2
Aug 25 21:57:01 friendsofhawaii sshd\[1671\]: Invalid user pvm from 113.194.90.28
Aug 25 21:57:01 friendsofhawaii sshd\[1671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.194.90.28
2019-08-26 16:08:46
190.13.151.1 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-25 17:40:49,723 INFO [shellcode_manager] (190.13.151.1) no match, writing hexdump (2ad9315e03bd56e29d32135a14018f37 :2132533) - MS17010 (EternalBlue)
2019-08-26 16:44:29
115.150.208.2 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-25 17:40:55,047 INFO [shellcode_manager] (115.150.208.2) no match, writing hexdump (58e580462f1d47a488fd00035c6a6d9b :2383152) - MS17010 (EternalBlue)
2019-08-26 16:30:28
144.217.83.201 attack
$f2bV_matches
2019-08-26 16:31:42
159.65.171.113 attackbots
Aug 26 09:44:28 v22019058497090703 sshd[15707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.171.113
Aug 26 09:44:31 v22019058497090703 sshd[15707]: Failed password for invalid user heroin from 159.65.171.113 port 53470 ssh2
Aug 26 09:50:09 v22019058497090703 sshd[16142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.171.113
...
2019-08-26 16:57:20
49.88.112.66 attack
$f2bV_matches
2019-08-26 16:44:06
101.226.168.96 attackbotsspam
*Port Scan* detected from 101.226.168.96 (CN/China/-). 4 hits in the last 201 seconds
2019-08-26 16:19:03
104.42.28.217 attackbotsspam
Aug 26 05:12:44 smtp-out sshd[13960]: Invalid user melissa from 104.42.28.217 port 10136
Aug 26 05:12:44 smtp-out sshd[13960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.42.28.217
Aug 26 05:12:46 smtp-out sshd[13960]: Failed password for invalid user melissa from 104.42.28.217 port 10136 ssh2
Aug 26 05:12:46 smtp-out sshd[13960]: Received disconnect from 104.42.28.217 port 10136:11: Bye Bye [preauth]
Aug 26 05:12:46 smtp-out sshd[13960]: Disconnected from 104.42.28.217 port 10136 [preauth]
Aug 26 05:18:16 smtp-out sshd[14100]: Invalid user reserverechner from 104.42.28.217 port 9232
Aug 26 05:18:16 smtp-out sshd[14100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.42.28.217


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.42.28.217
2019-08-26 16:44:55
77.247.110.20 attackspam
\[2019-08-26 02:09:25\] SECURITY\[1837\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-26T02:09:25.696-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="09981048422069004",SessionID="0x7f7b3071dc58",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.20/56283",ACLName="no_extension_match"
\[2019-08-26 02:10:54\] SECURITY\[1837\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-26T02:10:54.603-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="009981048422069004",SessionID="0x7f7b3038f128",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.20/60684",ACLName="no_extension_match"
\[2019-08-26 02:13:52\] SECURITY\[1837\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-26T02:13:52.567-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0009981048422069004",SessionID="0x7f7b30b15778",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.20/53542",ACLNam
2019-08-26 16:47:16
60.184.140.228 attackbots
Aug 26 05:24:52 vps691689 sshd[21827]: Failed password for root from 60.184.140.228 port 52011 ssh2
Aug 26 05:24:55 vps691689 sshd[21827]: Failed password for root from 60.184.140.228 port 52011 ssh2
Aug 26 05:24:58 vps691689 sshd[21827]: Failed password for root from 60.184.140.228 port 52011 ssh2
...
2019-08-26 16:26:44
165.227.157.168 attackbotsspam
Aug 26 09:32:05 nextcloud sshd\[17491\]: Invalid user oracle from 165.227.157.168
Aug 26 09:32:05 nextcloud sshd\[17491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.157.168
Aug 26 09:32:07 nextcloud sshd\[17491\]: Failed password for invalid user oracle from 165.227.157.168 port 54506 ssh2
...
2019-08-26 16:34:55
104.42.158.117 attackbotsspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-08-26 16:20:41

Recently Reported IPs

130.63.195.36 227.167.70.251 190.150.201.64 106.222.185.170
160.237.177.164 141.222.152.50 197.7.151.137 15.184.190.194
203.140.183.5 167.183.78.63 146.200.168.119 93.152.246.205
22.205.4.143 55.12.108.83 198.140.154.26 56.151.134.148
77.249.80.76 72.22.202.225 203.242.202.227 178.245.193.30