Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.231.68.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22002
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.231.68.122.			IN	A

;; AUTHORITY SECTION:
.			180	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 19:17:45 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 122.68.231.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 122.68.231.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.15.46.184 attackspam
Aug 30 06:28:41 aat-srv002 sshd[10646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.46.184
Aug 30 06:28:43 aat-srv002 sshd[10646]: Failed password for invalid user uftp from 51.15.46.184 port 41472 ssh2
Aug 30 06:32:34 aat-srv002 sshd[10765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.46.184
Aug 30 06:32:36 aat-srv002 sshd[10765]: Failed password for invalid user theobold from 51.15.46.184 port 58052 ssh2
...
2019-08-30 19:52:13
104.42.30.9 attackspam
Invalid user admin from 104.42.30.9 port 23232
2019-08-30 20:07:04
80.211.114.236 attackspambots
2019-08-30T10:43:47.700904abusebot.cloudsearch.cf sshd\[27839\]: Invalid user test from 80.211.114.236 port 49006
2019-08-30 19:29:23
147.135.186.76 attackbots
Port scan on 1 port(s): 139
2019-08-30 20:17:48
187.132.139.4 attack
Aug 30 13:45:39 vps647732 sshd[7608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.132.139.4
Aug 30 13:45:41 vps647732 sshd[7608]: Failed password for invalid user demo from 187.132.139.4 port 52739 ssh2
...
2019-08-30 20:03:26
167.71.158.65 attackspam
Aug 30 05:43:07 work-partkepr sshd\[20398\]: Invalid user lyc from 167.71.158.65 port 48714
Aug 30 05:43:08 work-partkepr sshd\[20398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.158.65
...
2019-08-30 20:04:19
180.252.49.11 attackspambots
Unauthorized connection attempt from IP address 180.252.49.11 on Port 445(SMB)
2019-08-30 20:02:00
36.67.154.13 attackspam
Unauthorized connection attempt from IP address 36.67.154.13 on Port 445(SMB)
2019-08-30 19:32:51
213.190.4.59 attackbotsspam
Aug 30 12:27:47 meumeu sshd[22028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.190.4.59 
Aug 30 12:27:49 meumeu sshd[22028]: Failed password for invalid user test from 213.190.4.59 port 36964 ssh2
Aug 30 12:32:45 meumeu sshd[23006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.190.4.59 
...
2019-08-30 20:17:17
200.231.131.18 attack
Unauthorized connection attempt from IP address 200.231.131.18 on Port 445(SMB)
2019-08-30 20:09:26
223.202.201.220 attackbotsspam
Aug 30 12:08:57 ArkNodeAT sshd\[8562\]: Invalid user dc from 223.202.201.220
Aug 30 12:08:57 ArkNodeAT sshd\[8562\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.202.201.220
Aug 30 12:08:59 ArkNodeAT sshd\[8562\]: Failed password for invalid user dc from 223.202.201.220 port 54141 ssh2
2019-08-30 20:19:17
81.241.50.141 attackspambots
Aug 29 22:21:23 kapalua sshd\[29154\]: Invalid user training from 81.241.50.141
Aug 29 22:21:23 kapalua sshd\[29154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.50-241-81.adsl-dyn.isp.belgacom.be
Aug 29 22:21:25 kapalua sshd\[29154\]: Failed password for invalid user training from 81.241.50.141 port 39554 ssh2
Aug 29 22:25:27 kapalua sshd\[29554\]: Invalid user mweb from 81.241.50.141
Aug 29 22:25:27 kapalua sshd\[29554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.50-241-81.adsl-dyn.isp.belgacom.be
2019-08-30 19:27:03
34.65.200.37 attackbots
Excessive Port-Scanning
2019-08-30 19:25:24
113.118.44.22 attackbotsspam
Unauthorized connection attempt from IP address 113.118.44.22 on Port 445(SMB)
2019-08-30 20:14:53
122.129.85.139 attackbotsspam
Honeypot attack, port: 445, PTR: 122-129-85-139.brain.net.pk.
2019-08-30 19:54:30

Recently Reported IPs

112.203.159.232 135.147.79.94 125.127.17.65 167.8.82.206
31.0.126.35 138.30.219.109 29.111.204.151 71.25.104.105
98.170.167.66 115.245.31.192 100.118.89.145 116.113.200.196
62.6.66.215 168.118.114.31 37.37.14.114 161.112.25.197
28.249.30.187 247.136.125.226 116.104.109.102 109.159.200.14