Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hessen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.22.89.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39432
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.22.89.67.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025042500 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 25 20:40:06 CST 2025
;; MSG SIZE  rcvd: 105
Host info
67.89.22.149.in-addr.arpa domain name pointer unn-149-22-89-67.datapacket.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
67.89.22.149.in-addr.arpa	name = unn-149-22-89-67.datapacket.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
37.49.231.105 attackbots
08/06/2019-02:37:23.898357 37.49.231.105 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 27
2019-08-06 16:34:57
202.83.127.157 attackbotsspam
fail2ban
2019-08-06 15:45:55
213.32.254.240 attackspam
email spam
2019-08-06 16:16:19
124.158.9.169 attack
Aug  6 04:34:36 debian sshd\[11531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.158.9.169  user=root
Aug  6 04:34:39 debian sshd\[11531\]: Failed password for root from 124.158.9.169 port 63954 ssh2
...
2019-08-06 16:36:20
37.49.225.224 attackspam
Brute force attempt
2019-08-06 15:53:38
103.27.237.67 attackbots
Aug  5 20:21:48 cac1d2 sshd\[14984\]: Invalid user applmgr from 103.27.237.67 port 30939
Aug  5 20:21:48 cac1d2 sshd\[14984\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.237.67
Aug  5 20:21:49 cac1d2 sshd\[14984\]: Failed password for invalid user applmgr from 103.27.237.67 port 30939 ssh2
...
2019-08-06 15:33:49
175.170.7.149 attackspam
Aug  6 01:53:51 master sshd[12993]: Failed password for invalid user admin from 175.170.7.149 port 11658 ssh2
Aug  6 01:53:53 master sshd[12993]: Failed password for invalid user admin from 175.170.7.149 port 11658 ssh2
Aug  6 01:53:55 master sshd[12993]: Failed password for invalid user admin from 175.170.7.149 port 11658 ssh2
2019-08-06 16:33:40
14.162.102.202 attack
Aug  6 04:06:34 master sshd[13180]: Failed password for invalid user admin from 14.162.102.202 port 52031 ssh2
2019-08-06 16:17:52
182.74.17.80 attack
Automatic report - Banned IP Access
2019-08-06 16:12:30
41.213.216.242 attackspambots
Aug  6 09:08:15 mail1 sshd\[26784\]: Invalid user rdillion from 41.213.216.242 port 57696
Aug  6 09:08:15 mail1 sshd\[26784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.213.216.242
Aug  6 09:08:17 mail1 sshd\[26784\]: Failed password for invalid user rdillion from 41.213.216.242 port 57696 ssh2
Aug  6 09:20:47 mail1 sshd\[32503\]: Invalid user remote from 41.213.216.242 port 42040
Aug  6 09:20:47 mail1 sshd\[32503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.213.216.242
...
2019-08-06 16:20:16
185.176.27.30 attack
Port scan on 3 port(s): 3603 3878 4230
2019-08-06 15:49:35
103.24.191.205 attackbotsspam
Aug  6 05:34:53 mail sshd\[27344\]: Invalid user test from 103.24.191.205 port 44430
Aug  6 05:34:53 mail sshd\[27344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.24.191.205
...
2019-08-06 15:34:45
94.191.108.37 attackspambots
Aug  6 04:02:26 game-panel sshd[4548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.108.37
Aug  6 04:02:28 game-panel sshd[4548]: Failed password for invalid user isaac from 94.191.108.37 port 60804 ssh2
Aug  6 04:04:59 game-panel sshd[4608]: Failed password for root from 94.191.108.37 port 55380 ssh2
2019-08-06 16:23:54
139.59.119.99 attack
firewall-block, port(s): 7443/tcp
2019-08-06 16:14:24
45.167.38.62 attack
SPAM Delivery Attempt
2019-08-06 16:03:16

Recently Reported IPs

146.70.113.118 149.22.89.80 149.88.27.138 149.52.89.77
82.180.173.188 206.99.175.210 41.154.80.223 8.137.13.148
52.191.190.79 43.130.228.73 20.168.122.192 109.118.70.6
71.188.8.56 145.148.47.55 252.27.49.29 216.163.53.119
95.134.250.60 183.80.250.195 170.4.220.62 170.4.220.110