Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: MCI Communications Services, Inc. d/b/a Verizon Business

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.230.11.156
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7961
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;149.230.11.156.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052700 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon May 27 21:07:31 CST 2019
;; MSG SIZE  rcvd: 118

Host info
Host 156.11.230.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 156.11.230.149.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
219.146.62.247 attackspam
firewall-block, port(s): 445/tcp
2020-03-25 20:05:46
192.12.240.40 attack
Port 80 (HTTP) access denied
2020-03-25 19:30:09
194.26.29.110 attackspam
Mar 25 11:21:45 src: 194.26.29.110 signature match: "BACKDOOR NetSphere Connection attempt" (sid: 100044) tcp port: 30100
2020-03-25 19:23:00
182.61.109.105 attack
Port 21795 scan denied
2020-03-25 19:38:49
169.197.108.203 attackbotsspam
Port 80 (HTTP) access denied
2020-03-25 19:39:59
89.144.47.246 attackbots
Mar 25 12:23:31 debian-2gb-nbg1-2 kernel: \[7394490.968784\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=89.144.47.246 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=26959 PROTO=TCP SPT=46971 DPT=3389 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-25 19:56:37
162.243.130.200 attack
28015/tcp 8022/tcp 8008/tcp...
[2020-02-01/03-25]19pkt,18pt.(tcp)
2020-03-25 19:43:40
198.108.66.234 attackspambots
8385/tcp 9072/tcp 9351/tcp...
[2020-01-26/03-25]99pkt,95pt.(tcp),1tp.(icmp)
2020-03-25 20:11:06
45.143.221.50 attackspambots
none
2020-03-25 20:01:24
198.108.67.33 attackspam
Port 9092 scan denied
2020-03-25 20:10:41
162.243.132.250 attackbots
20/3/25@06:46:27: FAIL: IoT-SSH address from=162.243.132.250
...
2020-03-25 19:41:17
192.241.237.45 attack
Port 995 scan denied
2020-03-25 19:29:49
222.186.19.221 attack
SIP/5060 Probe, BF, Hack -
2020-03-25 20:04:15
185.175.93.101 attackbotsspam
03/25/2020-03:16:05.237437 185.175.93.101 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-25 19:33:12
222.186.15.236 attackspam
firewall-block, port(s): 22/tcp
2020-03-25 20:04:38

Recently Reported IPs

71.148.87.251 2.147.99.45 206.123.222.247 1.109.13.86
107.28.125.209 63.158.128.173 77.198.147.217 118.255.53.14
120.250.201.9 12.109.105.11 110.14.91.36 223.146.85.152
195.185.118.253 5.133.179.122 86.2.222.184 183.184.242.150
220.5.198.225 85.218.136.24 189.128.0.6 99.111.174.14