Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.239.53.185
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44742
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.239.53.185.			IN	A

;; AUTHORITY SECTION:
.			176	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011400 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 14 15:06:35 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 185.53.239.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 185.53.239.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.30.114.22 attackbots
Invalid user viktor from 111.30.114.22 port 58818
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.30.114.22
Invalid user viktor from 111.30.114.22 port 58818
Failed password for invalid user viktor from 111.30.114.22 port 58818 ssh2
Invalid user server from 111.30.114.22 port 56338
2020-08-29 02:18:09
165.22.239.44 attackbots
Invalid user gerrit from 165.22.239.44 port 52510
2020-08-29 02:24:40
181.126.83.125 attack
Aug 28 14:16:41 abendstille sshd\[1977\]: Invalid user user1 from 181.126.83.125
Aug 28 14:16:41 abendstille sshd\[1977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.126.83.125
Aug 28 14:16:44 abendstille sshd\[1977\]: Failed password for invalid user user1 from 181.126.83.125 port 57108 ssh2
Aug 28 14:20:56 abendstille sshd\[6150\]: Invalid user teamspeak from 181.126.83.125
Aug 28 14:20:56 abendstille sshd\[6150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.126.83.125
...
2020-08-29 02:29:34
173.212.242.224 attack
URL Probing: /catalog/index.php
2020-08-29 02:36:30
51.174.135.83 attackbots
Fail2Ban Ban Triggered
Wordpress Sniffing
2020-08-29 02:05:27
117.57.62.120 attackspambots
28-8-2020 13:59:46	Unauthorized connection attempt (Brute-Force).
28-8-2020 13:59:46	Connection from IP address: 117.57.62.120 on port: 587


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=117.57.62.120
2020-08-29 02:06:06
64.213.148.44 attackbots
2020-08-28T15:39:42.984160upcloud.m0sh1x2.com sshd[23027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.213.148.44  user=root
2020-08-28T15:39:45.211221upcloud.m0sh1x2.com sshd[23027]: Failed password for root from 64.213.148.44 port 59872 ssh2
2020-08-29 02:20:58
222.89.70.216 attackspambots
port scan and connect, tcp 8080 (http-proxy)
2020-08-29 02:42:42
154.117.186.237 attack
Unauthorized connection attempt from IP address 154.117.186.237 on port 3389
2020-08-29 02:43:27
185.234.219.228 attackbots
abuse-sasl
2020-08-29 02:24:13
46.242.129.249 attack
$f2bV_matches
2020-08-29 02:34:36
203.176.74.228 attackspambots
Invalid user abhinav from 203.176.74.228 port 47206
2020-08-29 02:39:21
157.230.47.241 attack
Aug 28 14:53:44 ift sshd\[57950\]: Invalid user zhou from 157.230.47.241Aug 28 14:53:46 ift sshd\[57950\]: Failed password for invalid user zhou from 157.230.47.241 port 50814 ssh2Aug 28 14:58:33 ift sshd\[58538\]: Invalid user contest from 157.230.47.241Aug 28 14:58:35 ift sshd\[58538\]: Failed password for invalid user contest from 157.230.47.241 port 58830 ssh2Aug 28 15:03:22 ift sshd\[59908\]: Invalid user postgres from 157.230.47.241
...
2020-08-29 02:35:01
158.69.110.31 attack
2020-08-28T14:03:17.462362ks3355764 sshd[21956]: Invalid user ziang from 158.69.110.31 port 48934
2020-08-28T14:03:19.755171ks3355764 sshd[21956]: Failed password for invalid user ziang from 158.69.110.31 port 48934 ssh2
...
2020-08-29 02:36:48
139.99.125.84 attackspambots
Port probing on unauthorized port 22
2020-08-29 02:11:39

Recently Reported IPs

190.26.13.149 77.155.160.15 95.88.113.40 146.42.155.10
47.61.196.8 201.55.96.193 104.255.100.218 14.61.158.181
146.19.125.4 134.85.95.139 51.9.112.65 223.171.91.148
111.52.139.172 120.245.114.116 129.232.53.58 179.168.10.55
47.94.154.183 22.34.250.170 117.68.66.233 54.241.46.184