Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.219.20.151
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1606
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.219.20.151.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 199 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 22:48:35 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 151.20.219.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 151.20.219.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
95.221.62.215 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 04:06:35,731 INFO [amun_request_handler] PortScan Detected on Port: 445 (95.221.62.215)
2019-07-03 14:56:49
186.214.156.129 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 02:29:32,250 INFO [shellcode_manager] (186.214.156.129) no match, writing hexdump (a807d4b5b9c86a1d8704ff63ab3eb9b8 :14847) - SMB (Unknown)
2019-07-03 14:57:33
124.156.197.58 attack
995/tcp 5009/tcp 1000/tcp...
[2019-05-03/07-03]6pkt,6pt.(tcp)
2019-07-03 15:21:13
190.0.150.130 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 03:00:30,640 INFO [shellcode_manager] (190.0.150.130) no match, writing hexdump (039fa1b19b5bb015bf2684d6585ddeae :2211735) - MS17010 (EternalBlue)
2019-07-03 15:07:41
46.101.253.47 attackbots
Jul  3 07:08:07 ms-srv sshd[9567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.253.47  user=root
Jul  3 07:08:09 ms-srv sshd[9567]: Failed password for invalid user root from 46.101.253.47 port 52496 ssh2
2019-07-03 14:33:48
115.153.166.2 attack
Jul  1 13:37:57 eola postfix/smtpd[25187]: connect from unknown[115.153.166.2]
Jul  1 13:37:57 eola postfix/smtpd[25194]: connect from unknown[115.153.166.2]
Jul  1 13:38:01 eola postfix/smtpd[25194]: lost connection after AUTH from unknown[115.153.166.2]
Jul  1 13:38:01 eola postfix/smtpd[25194]: disconnect from unknown[115.153.166.2] ehlo=1 auth=0/1 commands=1/2
Jul  1 13:38:01 eola postfix/smtpd[25194]: connect from unknown[115.153.166.2]
Jul  1 13:38:04 eola postfix/smtpd[25194]: lost connection after AUTH from unknown[115.153.166.2]
Jul  1 13:38:04 eola postfix/smtpd[25194]: disconnect from unknown[115.153.166.2] ehlo=1 auth=0/1 commands=1/2
Jul  1 13:38:05 eola postfix/smtpd[25194]: connect from unknown[115.153.166.2]
Jul  1 13:38:08 eola postfix/smtpd[25194]: lost connection after AUTH from unknown[115.153.166.2]
Jul  1 13:38:08 eola postfix/smtpd[25194]: disconnect from unknown[115.153.166.2] ehlo=1 auth=0/1 commands=1/2
Jul  1 13:38:08 eola postfix/smtpd[25194]........
-------------------------------
2019-07-03 15:14:32
162.243.145.108 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2019-07-03 14:51:47
188.19.254.45 attack
Данный человек взламывает аккаунты других пользователей в разных сетях и программах.
2019-07-03 14:44:45
67.205.135.65 attackbotsspam
Brute force attempt
2019-07-03 15:11:31
118.232.163.200 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 02:29:53,506 INFO [shellcode_manager] (118.232.163.200) no match, writing hexdump (49e90b2a40fd8cfbf3e002d3c44ccc90 :2393089) - MS17010 (EternalBlue)
2019-07-03 14:50:36
175.146.235.71 attack
5555/tcp 60001/tcp
[2019-06-30/07-03]2pkt
2019-07-03 14:54:39
180.183.168.66 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-02 03:34:48,408 INFO [shellcode_manager] (180.183.168.66) no match, writing hexdump (8b2950d7ec1611c467ee73c29149f1e6 :2105970) - MS17010 (EternalBlue)
2019-07-03 15:13:45
178.128.193.158 attack
Banned for posting to wp-login.php without referer {"redirect_to":"","user_email":"master@createsimpledomain.icu","user_login":"mastericuuu","wp-submit":"Register"}
2019-07-03 15:23:47
194.36.97.125 attackbotsspam
Detected by ModSecurity. Request URI: /wp-login.php?action=register
2019-07-03 15:22:27
62.210.141.162 attackspam
Jul  3 07:11:22 heissa sshd\[32717\]: Invalid user openbraov from 62.210.141.162 port 34056
Jul  3 07:11:23 heissa sshd\[32717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62-210-141-162.rev.poneytelecom.eu
Jul  3 07:11:24 heissa sshd\[32717\]: Failed password for invalid user openbraov from 62.210.141.162 port 34056 ssh2
Jul  3 07:14:21 heissa sshd\[583\]: Invalid user tester from 62.210.141.162 port 41406
Jul  3 07:14:21 heissa sshd\[583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62-210-141-162.rev.poneytelecom.eu
2019-07-03 14:51:09

Recently Reported IPs

192.226.176.213 172.120.68.189 244.76.28.88 148.247.167.146
133.63.95.9 149.16.194.198 151.87.60.179 153.244.52.15
177.81.208.97 88.204.63.7 173.123.180.177 151.89.230.177
55.10.86.94 58.90.235.1 13.8.18.14 55.201.104.147
236.204.207.0 243.7.137.136 116.204.219.25 65.96.10.93