Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: EntServ Deutschland GmbH

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.211.243.198
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17486
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;149.211.243.198.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061002 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jun 11 04:41:58 CST 2019
;; MSG SIZE  rcvd: 119

Host info
Host 198.243.211.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 198.243.211.149.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
121.182.166.81 attackbotsspam
Aug 29 05:44:45 mail sshd\[30777\]: Invalid user prova from 121.182.166.81\
Aug 29 05:44:47 mail sshd\[30777\]: Failed password for invalid user prova from 121.182.166.81 port 29234 ssh2\
Aug 29 05:49:46 mail sshd\[30795\]: Invalid user teamspeak from 121.182.166.81\
Aug 29 05:49:47 mail sshd\[30795\]: Failed password for invalid user teamspeak from 121.182.166.81 port 18771 ssh2\
Aug 29 05:54:42 mail sshd\[30815\]: Invalid user john1 from 121.182.166.81\
Aug 29 05:54:44 mail sshd\[30815\]: Failed password for invalid user john1 from 121.182.166.81 port 64813 ssh2\
2019-08-29 12:05:24
46.229.168.161 attackbots
Malicious Traffic/Form Submission
2019-08-29 12:15:53
218.201.214.177 attackspam
"Fail2Ban detected SSH brute force attempt"
2019-08-29 12:28:10
54.38.18.211 attackspambots
Aug 29 02:21:31 localhost sshd\[7092\]: Invalid user postgres from 54.38.18.211 port 57532
Aug 29 02:21:31 localhost sshd\[7092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.18.211
Aug 29 02:21:34 localhost sshd\[7092\]: Failed password for invalid user postgres from 54.38.18.211 port 57532 ssh2
...
2019-08-29 12:08:38
36.108.170.241 attackspambots
Aug 29 03:56:49 [host] sshd[26939]: Invalid user 123456 from 36.108.170.241
Aug 29 03:56:49 [host] sshd[26939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.108.170.241
Aug 29 03:56:51 [host] sshd[26939]: Failed password for invalid user 123456 from 36.108.170.241 port 33372 ssh2
2019-08-29 11:52:46
119.61.26.165 attackspambots
Aug 28 18:00:27 auw2 sshd\[29966\]: Invalid user maximilian from 119.61.26.165
Aug 28 18:00:27 auw2 sshd\[29966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.61.26.165
Aug 28 18:00:29 auw2 sshd\[29966\]: Failed password for invalid user maximilian from 119.61.26.165 port 37783 ssh2
Aug 28 18:05:36 auw2 sshd\[30490\]: Invalid user ritmo from 119.61.26.165
Aug 28 18:05:36 auw2 sshd\[30490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.61.26.165
2019-08-29 12:21:08
82.251.46.69 attackspam
Aug 29 04:16:22 MK-Soft-VM4 sshd\[8249\]: Invalid user demo from 82.251.46.69 port 33516
Aug 29 04:16:22 MK-Soft-VM4 sshd\[8249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.251.46.69
Aug 29 04:16:25 MK-Soft-VM4 sshd\[8249\]: Failed password for invalid user demo from 82.251.46.69 port 33516 ssh2
...
2019-08-29 12:18:14
218.24.167.204 attackspambots
SSHAttack
2019-08-29 12:15:08
103.28.57.86 attackspambots
2019-08-29T04:10:19.581539abusebot-2.cloudsearch.cf sshd\[30832\]: Invalid user areyes from 103.28.57.86 port 48510
2019-08-29 12:22:58
46.246.213.140 attackbots
" "
2019-08-29 11:53:40
178.128.54.223 attackspam
Aug 28 16:04:52 hanapaa sshd\[665\]: Invalid user asd from 178.128.54.223
Aug 28 16:04:52 hanapaa sshd\[665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.54.223
Aug 28 16:04:54 hanapaa sshd\[665\]: Failed password for invalid user asd from 178.128.54.223 port 58734 ssh2
Aug 28 16:12:27 hanapaa sshd\[1461\]: Invalid user xie from 178.128.54.223
Aug 28 16:12:27 hanapaa sshd\[1461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.54.223
2019-08-29 12:12:14
51.75.123.124 attackbots
2019-08-18T15:53:12.800251wiz-ks3 sshd[4723]: Invalid user test from 51.75.123.124 port 60328
2019-08-18T15:53:12.802253wiz-ks3 sshd[4723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.ip-51-75-123.eu
2019-08-18T15:53:12.800251wiz-ks3 sshd[4723]: Invalid user test from 51.75.123.124 port 60328
2019-08-18T15:53:14.543007wiz-ks3 sshd[4723]: Failed password for invalid user test from 51.75.123.124 port 60328 ssh2
2019-08-18T15:53:12.802253wiz-ks3 sshd[4723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.ip-51-75-123.eu
2019-08-18T15:53:12.800251wiz-ks3 sshd[4723]: Invalid user test from 51.75.123.124 port 60328
2019-08-18T15:53:14.543007wiz-ks3 sshd[4723]: Failed password for invalid user test from 51.75.123.124 port 60328 ssh2
2019-08-18T15:53:22.945357wiz-ks3 sshd[4725]: Invalid user user from 51.75.123.124 port 36110
...
2019-08-29 11:44:40
68.183.115.83 attack
Aug 28 17:57:06 php1 sshd\[14605\]: Invalid user ls from 68.183.115.83
Aug 28 17:57:06 php1 sshd\[14605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.115.83
Aug 28 17:57:09 php1 sshd\[14605\]: Failed password for invalid user ls from 68.183.115.83 port 50532 ssh2
Aug 28 18:01:11 php1 sshd\[14964\]: Invalid user noc from 68.183.115.83
Aug 28 18:01:11 php1 sshd\[14964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.115.83
2019-08-29 12:01:49
1.60.122.99 attackbotsspam
firewall-block, port(s): 8080/tcp
2019-08-29 12:04:32
94.177.215.195 attack
Aug 29 05:59:12 [host] sshd[29608]: Invalid user arun from 94.177.215.195
Aug 29 05:59:12 [host] sshd[29608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.215.195
Aug 29 05:59:14 [host] sshd[29608]: Failed password for invalid user arun from 94.177.215.195 port 45992 ssh2
2019-08-29 12:06:50

Recently Reported IPs

139.166.39.225 132.71.176.133 2.122.235.255 54.252.198.156
205.61.61.246 222.81.97.225 77.247.110.147 194.56.69.128
178.62.203.61 142.93.107.83 71.159.34.0 151.133.206.24
67.40.77.165 18.228.235.224 194.254.108.108 79.22.54.37
167.0.217.82 193.132.182.26 71.16.188.124 76.118.114.164