Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.224.66.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35800
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;149.224.66.219.			IN	A

;; AUTHORITY SECTION:
.			568	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100501 1800 900 604800 86400

;; Query time: 107 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 06 04:01:26 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 219.66.224.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 219.66.224.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
217.182.70.125 attackspambots
Dec 15 19:09:22 kapalua sshd\[3449\]: Invalid user passwd222 from 217.182.70.125
Dec 15 19:09:22 kapalua sshd\[3449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.ip-217-182-70.eu
Dec 15 19:09:24 kapalua sshd\[3449\]: Failed password for invalid user passwd222 from 217.182.70.125 port 40240 ssh2
Dec 15 19:15:23 kapalua sshd\[4037\]: Invalid user 123456 from 217.182.70.125
Dec 15 19:15:23 kapalua sshd\[4037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.ip-217-182-70.eu
2019-12-16 13:21:03
79.120.227.91 attackbots
SSH invalid-user multiple login try
2019-12-16 13:08:46
190.75.81.245 attack
port scan and connect, tcp 1433 (ms-sql-s)
2019-12-16 13:08:11
129.211.2.241 attack
Dec 16 05:58:28 MK-Soft-VM6 sshd[18726]: Failed password for root from 129.211.2.241 port 54182 ssh2
...
2019-12-16 13:06:30
163.172.207.104 attackbots
\[2019-12-16 00:09:48\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-16T00:09:48.962-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="888011972592277524",SessionID="0x7f0fb40977c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/55081",ACLName="no_extension_match"
\[2019-12-16 00:09:56\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-16T00:09:56.165-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="8011972595725636",SessionID="0x7f0fb447f838",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/51089",ACLName="no_extension_match"
\[2019-12-16 00:14:40\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-16T00:14:40.522-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="8888011972592277524",SessionID="0x7f0fb4477cf8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/58769",A
2019-12-16 13:24:31
128.199.240.120 attackbots
Dec 16 05:51:01 meumeu sshd[5890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.240.120 
Dec 16 05:51:03 meumeu sshd[5890]: Failed password for invalid user 123456 from 128.199.240.120 port 37646 ssh2
Dec 16 05:57:35 meumeu sshd[6777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.240.120 
...
2019-12-16 13:22:19
39.67.45.179 attack
[portscan] Port scan
2019-12-16 13:33:37
119.90.61.10 attack
Dec 16 05:52:36 jane sshd[22118]: Failed password for root from 119.90.61.10 port 43098 ssh2
...
2019-12-16 13:15:54
192.3.25.92 attackspambots
Dec 16 06:12:05 sd-53420 sshd\[17637\]: Invalid user marian from 192.3.25.92
Dec 16 06:12:05 sd-53420 sshd\[17637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.25.92
Dec 16 06:12:07 sd-53420 sshd\[17637\]: Failed password for invalid user marian from 192.3.25.92 port 48643 ssh2
Dec 16 06:19:35 sd-53420 sshd\[20489\]: User root from 192.3.25.92 not allowed because none of user's groups are listed in AllowGroups
Dec 16 06:19:35 sd-53420 sshd\[20489\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.25.92  user=root
...
2019-12-16 13:21:16
192.3.211.114 attack
Dec 16 05:12:17 web8 sshd\[32512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.211.114  user=root
Dec 16 05:12:19 web8 sshd\[32512\]: Failed password for root from 192.3.211.114 port 50064 ssh2
Dec 16 05:19:54 web8 sshd\[3883\]: Invalid user kelvin from 192.3.211.114
Dec 16 05:19:54 web8 sshd\[3883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.211.114
Dec 16 05:19:56 web8 sshd\[3883\]: Failed password for invalid user kelvin from 192.3.211.114 port 56428 ssh2
2019-12-16 13:23:29
178.128.238.248 attack
Dec 16 10:25:24 gw1 sshd[26893]: Failed password for root from 178.128.238.248 port 34510 ssh2
...
2019-12-16 13:31:23
45.119.215.68 attack
Dec 15 18:50:12 sachi sshd\[27962\]: Invalid user durk from 45.119.215.68
Dec 15 18:50:12 sachi sshd\[27962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.215.68
Dec 15 18:50:14 sachi sshd\[27962\]: Failed password for invalid user durk from 45.119.215.68 port 60482 ssh2
Dec 15 18:57:49 sachi sshd\[28576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.215.68  user=nobody
Dec 15 18:57:50 sachi sshd\[28576\]: Failed password for nobody from 45.119.215.68 port 40012 ssh2
2019-12-16 13:07:25
36.66.170.47 attackspambots
1576472261 - 12/16/2019 05:57:41 Host: 36.66.170.47/36.66.170.47 Port: 445 TCP Blocked
2019-12-16 13:16:57
129.213.194.201 attack
Dec 16 06:57:36 sauna sshd[163832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.194.201
Dec 16 06:57:38 sauna sshd[163832]: Failed password for invalid user 555555555 from 129.213.194.201 port 58601 ssh2
...
2019-12-16 13:20:45
142.93.235.47 attackbotsspam
Dec 16 01:03:22 game-panel sshd[25250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.235.47
Dec 16 01:03:24 game-panel sshd[25250]: Failed password for invalid user mikizo from 142.93.235.47 port 43244 ssh2
Dec 16 01:08:21 game-panel sshd[25463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.235.47
2019-12-16 09:15:11

Recently Reported IPs

56.83.240.248 83.201.43.74 137.22.186.248 145.132.67.85
5.42.158.122 187.228.54.252 74.171.61.30 170.148.71.56
64.66.208.244 14.28.159.248 60.47.151.106 45.70.18.242
3.47.19.75 217.91.199.158 80.225.35.89 14.8.87.198
165.54.228.144 111.53.77.61 119.62.164.197 187.57.158.201