Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.239.131.165
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2286
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.239.131.165.		IN	A

;; AUTHORITY SECTION:
.			389	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 22:12:43 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 165.131.239.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 165.131.239.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
85.209.0.150 attackspam
Sep 30 04:37:28 doubuntu sshd[2544]: Did not receive identification string from 85.209.0.150 port 40820
Sep 30 04:37:33 doubuntu sshd[2547]: Connection closed by authenticating user root 85.209.0.150 port 63176 [preauth]
Sep 30 04:37:33 doubuntu sshd[2548]: Connection closed by authenticating user root 85.209.0.150 port 49902 [preauth]
...
2020-09-30 15:12:43
193.239.147.179 attackbots
SASL PLAIN auth failed: ruser=...
2020-09-30 15:06:48
103.114.221.16 attack
Brute%20Force%20SSH
2020-09-30 14:33:50
78.56.181.30 attackbotsspam
Attempting to access Wordpress login on a honeypot or private system.
2020-09-30 14:47:37
167.71.224.234 attackspam
Sep 30 02:01:05 gospond sshd[24029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.224.234 
Sep 30 02:01:05 gospond sshd[24029]: Invalid user stats from 167.71.224.234 port 42050
Sep 30 02:01:06 gospond sshd[24029]: Failed password for invalid user stats from 167.71.224.234 port 42050 ssh2
...
2020-09-30 14:49:28
212.119.241.46 attackbots
Invalid user oracle from 212.119.241.46 port 58543
2020-09-30 14:32:30
146.148.112.54 attack
SSH/22 MH Probe, BF, Hack -
2020-09-30 15:08:15
108.190.31.236 attackspam
Automatic report - Banned IP Access
2020-09-30 14:59:09
123.171.6.137 attack
[MK-VM2] Blocked by UFW
2020-09-30 15:04:46
183.61.109.23 attackbots
Sep 30 01:16:21 piServer sshd[18761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.61.109.23 
Sep 30 01:16:23 piServer sshd[18761]: Failed password for invalid user martha from 183.61.109.23 port 56300 ssh2
Sep 30 01:19:05 piServer sshd[19025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.61.109.23 
...
2020-09-30 15:04:13
117.215.149.114 attackspam
IP 117.215.149.114 attacked honeypot on port: 23 at 9/29/2020 1:36:58 PM
2020-09-30 15:14:41
189.209.255.118 attack
Automatic report - Port Scan Attack
2020-09-30 14:43:53
103.254.209.201 attackbotsspam
Sep 30 06:50:31 game-panel sshd[12460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.254.209.201
Sep 30 06:50:34 game-panel sshd[12460]: Failed password for invalid user samba from 103.254.209.201 port 43882 ssh2
Sep 30 06:54:42 game-panel sshd[12612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.254.209.201
2020-09-30 15:02:23
195.191.12.33 attackspam
Port Scan detected!
...
2020-09-30 15:01:54
112.225.139.232 attackspam
Automatic report - Port Scan Attack
2020-09-30 14:34:30

Recently Reported IPs

175.33.161.152 240.71.139.84 115.98.124.183 172.206.233.56
192.209.210.107 148.83.31.242 114.228.215.47 116.228.183.38
152.69.4.46 14.220.232.41 134.4.253.165 110.172.213.118
169.90.7.122 111.110.177.135 109.118.91.50 136.210.140.79
203.31.211.238 157.211.71.233 146.119.188.124 155.74.20.105