Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.239.112.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65203
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.239.112.149.		IN	A

;; AUTHORITY SECTION:
.			320	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011201 1800 900 604800 86400

;; Query time: 126 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 13 06:49:59 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 149.112.239.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.112.239.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
140.143.160.41 attack
detected by Fail2Ban
2020-04-27 06:03:22
37.152.183.16 attackspambots
SSH Invalid Login
2020-04-27 05:49:50
64.227.7.213 attackbots
Automatic report - XMLRPC Attack
2020-04-27 05:47:32
116.241.20.28 attack
Telnet Server BruteForce Attack
2020-04-27 05:59:32
202.175.250.219 attackbotsspam
(sshd) Failed SSH login from 202.175.250.219 (PH/Philippines/219.250.175.202.static.eastern-tele.com): 5 in the last 3600 secs
2020-04-27 06:08:45
185.200.118.69 attackbots
" "
2020-04-27 05:45:07
136.255.144.2 attackspam
Apr 26 23:59:54 OPSO sshd\[390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.255.144.2  user=root
Apr 26 23:59:55 OPSO sshd\[390\]: Failed password for root from 136.255.144.2 port 54804 ssh2
Apr 27 00:01:52 OPSO sshd\[1075\]: Invalid user www from 136.255.144.2 port 57898
Apr 27 00:01:52 OPSO sshd\[1075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.255.144.2
Apr 27 00:01:54 OPSO sshd\[1075\]: Failed password for invalid user www from 136.255.144.2 port 57898 ssh2
2020-04-27 06:02:08
27.128.187.131 attackspambots
2020-04-26T22:10:27.278239shield sshd\[26658\]: Invalid user ahmet from 27.128.187.131 port 60436
2020-04-26T22:10:27.281957shield sshd\[26658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.187.131
2020-04-26T22:10:29.084845shield sshd\[26658\]: Failed password for invalid user ahmet from 27.128.187.131 port 60436 ssh2
2020-04-26T22:14:16.286548shield sshd\[27418\]: Invalid user hua from 27.128.187.131 port 40584
2020-04-26T22:14:16.290285shield sshd\[27418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.187.131
2020-04-27 06:15:59
51.91.79.232 attackbotsspam
2020-04-26T21:27:57.634996shield sshd\[18265\]: Invalid user test from 51.91.79.232 port 37480
2020-04-26T21:27:57.638624shield sshd\[18265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=232.ip-51-91-79.eu
2020-04-26T21:27:59.365380shield sshd\[18265\]: Failed password for invalid user test from 51.91.79.232 port 37480 ssh2
2020-04-26T21:31:41.860671shield sshd\[19143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=232.ip-51-91-79.eu  user=root
2020-04-26T21:31:44.007844shield sshd\[19143\]: Failed password for root from 51.91.79.232 port 49036 ssh2
2020-04-27 05:48:04
107.170.249.243 attackbots
SSH Invalid Login
2020-04-27 06:23:39
112.85.42.178 attackspam
Apr 27 00:10:31 pve1 sshd[5228]: Failed password for root from 112.85.42.178 port 3197 ssh2
Apr 27 00:10:36 pve1 sshd[5228]: Failed password for root from 112.85.42.178 port 3197 ssh2
...
2020-04-27 06:25:27
167.172.115.84 attack
Bruteforce detected by fail2ban
2020-04-27 05:50:19
138.197.180.29 attack
Apr 26 21:40:38 ip-172-31-61-156 sshd[32728]: Invalid user soldat from 138.197.180.29
Apr 26 21:40:40 ip-172-31-61-156 sshd[32728]: Failed password for invalid user soldat from 138.197.180.29 port 37626 ssh2
Apr 26 21:40:38 ip-172-31-61-156 sshd[32728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.180.29
Apr 26 21:40:38 ip-172-31-61-156 sshd[32728]: Invalid user soldat from 138.197.180.29
Apr 26 21:40:40 ip-172-31-61-156 sshd[32728]: Failed password for invalid user soldat from 138.197.180.29 port 37626 ssh2
...
2020-04-27 06:09:09
207.46.13.177 attackbotsspam
Automatic report - Banned IP Access
2020-04-27 06:06:47
218.92.0.191 attackbotsspam
Apr 26 23:53:38 sip sshd[9832]: Failed password for root from 218.92.0.191 port 56664 ssh2
Apr 26 23:53:40 sip sshd[9832]: Failed password for root from 218.92.0.191 port 56664 ssh2
Apr 26 23:53:44 sip sshd[9832]: Failed password for root from 218.92.0.191 port 56664 ssh2
...
2020-04-27 05:57:45

Recently Reported IPs

127.29.45.109 209.87.172.145 7.81.100.129 245.30.0.248
104.241.135.49 151.253.78.249 142.223.153.3 213.188.183.218
45.81.136.166 130.57.219.55 158.188.176.56 20.250.49.212
62.76.236.206 200.24.128.236 220.189.154.106 209.159.31.229
153.104.97.115 64.167.58.167 241.130.247.122 253.125.159.192