Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.229.57.240
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31826
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.229.57.240.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022701 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 03:09:22 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 240.57.229.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 240.57.229.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
199.87.154.255 attack
Reported by AbuseIPDB proxy server.
2019-08-27 03:06:38
115.79.33.195 attackspam
Unauthorized connection attempt from IP address 115.79.33.195 on Port 445(SMB)
2019-08-27 03:22:51
159.148.4.236 attack
Aug 26 19:22:32 ns315508 sshd[32596]: Invalid user sowmya from 159.148.4.236 port 57566
Aug 26 19:22:32 ns315508 sshd[32596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.148.4.236
Aug 26 19:22:32 ns315508 sshd[32596]: Invalid user sowmya from 159.148.4.236 port 57566
Aug 26 19:22:34 ns315508 sshd[32596]: Failed password for invalid user sowmya from 159.148.4.236 port 57566 ssh2
Aug 26 19:26:55 ns315508 sshd[32678]: Invalid user qhsupport from 159.148.4.236 port 47858
...
2019-08-27 03:29:39
35.187.248.21 attackspam
Aug 26 10:39:52 vtv3 sshd\[23372\]: Invalid user zander from 35.187.248.21 port 55756
Aug 26 10:39:52 vtv3 sshd\[23372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.187.248.21
Aug 26 10:39:54 vtv3 sshd\[23372\]: Failed password for invalid user zander from 35.187.248.21 port 55756 ssh2
Aug 26 10:45:21 vtv3 sshd\[26794\]: Invalid user csilla from 35.187.248.21 port 50618
Aug 26 10:45:21 vtv3 sshd\[26794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.187.248.21
Aug 26 11:01:28 vtv3 sshd\[2754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.187.248.21  user=root
Aug 26 11:01:30 vtv3 sshd\[2754\]: Failed password for root from 35.187.248.21 port 41246 ssh2
Aug 26 11:08:45 vtv3 sshd\[6095\]: Invalid user search from 35.187.248.21 port 56950
Aug 26 11:08:45 vtv3 sshd\[6095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35
2019-08-27 03:20:27
217.32.246.248 attackbots
2019-08-26T19:14:17.591306abusebot-3.cloudsearch.cf sshd\[21001\]: Invalid user postgres from 217.32.246.248 port 47540
2019-08-27 03:25:16
183.88.1.189 attack
Unauthorized connection attempt from IP address 183.88.1.189 on Port 445(SMB)
2019-08-27 03:30:44
5.63.151.111 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-27 03:40:33
61.223.78.33 attack
Telnet Server BruteForce Attack
2019-08-27 03:32:44
203.129.241.87 attackbots
Aug 26 20:54:08 localhost sshd\[12582\]: Invalid user info2 from 203.129.241.87 port 45472
Aug 26 20:54:08 localhost sshd\[12582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.129.241.87
Aug 26 20:54:09 localhost sshd\[12582\]: Failed password for invalid user info2 from 203.129.241.87 port 45472 ssh2
2019-08-27 02:57:31
164.132.51.91 attack
$f2bV_matches
2019-08-27 02:48:58
177.139.248.46 attack
Aug 26 20:39:55 vps647732 sshd[26900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.139.248.46
Aug 26 20:39:57 vps647732 sshd[26900]: Failed password for invalid user tian from 177.139.248.46 port 51454 ssh2
...
2019-08-27 02:47:48
82.202.172.156 attackspambots
Aug 26 15:11:17 debian sshd\[6674\]: Invalid user pfdracin from 82.202.172.156 port 53596
Aug 26 15:11:17 debian sshd\[6674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.202.172.156
...
2019-08-27 03:32:25
80.95.45.143 attackspam
Unauthorized connection attempt from IP address 80.95.45.143 on Port 445(SMB)
2019-08-27 02:49:56
54.36.149.29 attack
Automatic report - Banned IP Access
2019-08-27 03:30:11
220.191.228.2 attackbotsspam
Unauthorized connection attempt from IP address 220.191.228.2 on Port 445(SMB)
2019-08-27 03:38:02

Recently Reported IPs

80.70.86.138 149.54.46.50 132.43.242.135 62.88.170.176
119.107.127.118 15.162.117.245 231.65.143.176 69.118.15.181
147.142.147.141 171.23.244.206 130.120.246.179 96.208.197.161
95.194.232.191 15.254.156.230 168.126.182.137 14.78.122.94
246.120.204.71 221.55.129.220 173.127.91.114 249.110.251.208