Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Schwentinental

Region: Schleswig-Holstein

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.222.59.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57217
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.222.59.14.			IN	A

;; AUTHORITY SECTION:
.			264	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060301 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 04 10:10:36 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 14.59.222.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.59.222.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.93.170.220 attack
Automatic report - Banned IP Access
2020-10-13 16:36:33
167.114.3.105 attack
Automatic report BANNED IP
2020-10-13 16:29:02
106.198.209.28 attack
1602535560 - 10/12/2020 22:46:00 Host: 106.198.209.28/106.198.209.28 Port: 445 TCP Blocked
...
2020-10-13 16:41:25
46.218.85.122 attack
SSH login attempts.
2020-10-13 16:41:39
46.43.91.160 attack
Unauthorized connection attempt from IP address 46.43.91.160 on Port 445(SMB)
2020-10-13 17:02:28
112.172.147.34 attackbots
$f2bV_matches
2020-10-13 16:52:01
139.255.86.19 attackbots
Unauthorized connection attempt detected from IP address 139.255.86.19 to port 445 [T]
2020-10-13 16:26:36
115.159.157.154 attackbotsspam
web-1 [ssh_2] SSH Attack
2020-10-13 16:21:41
221.207.8.251 attack
B: Abusive ssh attack
2020-10-13 16:54:23
156.96.47.5 attackspambots
IP: 156.96.47.5
Ports affected
    Simple Mail Transfer (25) 
Abuse Confidence rating 55%
Found in DNSBL('s)
ASN Details
   AS46664 VDI-NETWORK
   United States (US)
   CIDR 156.96.44.0/22
Log Date: 13/10/2020 4:50:06 AM UTC
2020-10-13 16:30:39
138.59.40.199 attackspambots
Attempted Brute Force (dovecot)
2020-10-13 16:38:14
161.35.170.145 attackspam
Lines containing failures of 161.35.170.145
Oct 12 22:41:45 kmh-mb-001 sshd[27590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.170.145  user=r.r
Oct 12 22:41:47 kmh-mb-001 sshd[27590]: Failed password for r.r from 161.35.170.145 port 46862 ssh2
Oct 12 22:41:49 kmh-mb-001 sshd[27590]: Received disconnect from 161.35.170.145 port 46862:11: Bye Bye [preauth]
Oct 12 22:41:49 kmh-mb-001 sshd[27590]: Disconnected from authenticating user r.r 161.35.170.145 port 46862 [preauth]
Oct 12 22:46:58 kmh-mb-001 sshd[27793]: Invalid user m5 from 161.35.170.145 port 59870
Oct 12 22:46:58 kmh-mb-001 sshd[27793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.170.145 
Oct 12 22:47:00 kmh-mb-001 sshd[27793]: Failed password for invalid user m5 from 161.35.170.145 port 59870 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=161.35.170.145
2020-10-13 16:25:07
5.188.206.200 attackspam
Oct 13 09:35:04 mail postfix/smtpd\[12208\]: warning: unknown\[5.188.206.200\]: SASL PLAIN authentication failed: \
Oct 13 09:35:22 mail postfix/smtpd\[12208\]: warning: unknown\[5.188.206.200\]: SASL PLAIN authentication failed: \
Oct 13 10:10:37 mail postfix/smtpd\[13757\]: warning: unknown\[5.188.206.200\]: SASL PLAIN authentication failed: \
Oct 13 10:10:53 mail postfix/smtpd\[13757\]: warning: unknown\[5.188.206.200\]: SASL PLAIN authentication failed: \
2020-10-13 16:18:09
189.101.237.43 attack
Brute%20Force%20SSH
2020-10-13 17:01:00
118.25.1.48 attack
2020-10-13T09:33:29.768169vps773228.ovh.net sshd[29950]: Failed password for invalid user chris from 118.25.1.48 port 40598 ssh2
2020-10-13T09:36:04.948013vps773228.ovh.net sshd[30052]: Invalid user hera from 118.25.1.48 port 37738
2020-10-13T09:36:04.965203vps773228.ovh.net sshd[30052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.1.48
2020-10-13T09:36:04.948013vps773228.ovh.net sshd[30052]: Invalid user hera from 118.25.1.48 port 37738
2020-10-13T09:36:07.087125vps773228.ovh.net sshd[30052]: Failed password for invalid user hera from 118.25.1.48 port 37738 ssh2
...
2020-10-13 16:27:43

Recently Reported IPs

17.29.154.172 46.233.78.252 103.250.247.64 114.75.225.8
113.104.145.222 13.30.128.16 147.136.191.248 56.178.216.192
163.99.251.153 23.124.133.63 6.211.198.116 120.183.155.74
211.172.212.54 10.242.14.42 206.146.60.107 143.62.105.151
140.44.207.6 78.124.245.2 174.87.102.52 247.152.15.230