Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.24.158.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13731
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.24.158.147.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 02:56:11 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 147.158.24.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.158.24.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
27.67.135.23 attack
1586767528 - 04/13/2020 10:45:28 Host: 27.67.135.23/27.67.135.23 Port: 445 TCP Blocked
2020-04-13 17:40:03
121.132.52.31 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-13 17:31:55
46.148.21.32 attackbotsspam
Target: :2222
2020-04-13 17:21:54
110.248.233.165 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-13 17:09:15
117.232.67.181 attack
Unauthorized connection attempt from IP address 117.232.67.181 on Port 445(SMB)
2020-04-13 17:29:34
188.166.5.56 attackspam
GET /wp-login.php
IP address is infected with the Conficker malicious botnet
TCP connection from "188.166.5.56" on port "50042" going to IP address "38.229.144.149"
2020-04-13 17:47:39
183.80.54.91 attackspam
20/4/13@04:45:29: FAIL: Alarm-Network address from=183.80.54.91
20/4/13@04:45:29: FAIL: Alarm-Network address from=183.80.54.91
...
2020-04-13 17:41:10
79.104.45.218 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-13 17:49:09
217.182.147.101 attack
20 attempts against mh-misbehave-ban on beach
2020-04-13 17:24:49
111.230.73.133 attack
Apr 13 08:38:04 localhost sshd\[17179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.73.133  user=man
Apr 13 08:38:06 localhost sshd\[17179\]: Failed password for man from 111.230.73.133 port 53058 ssh2
Apr 13 08:45:39 localhost sshd\[17300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.73.133  user=root
...
2020-04-13 17:19:42
113.186.124.210 attackbotsspam
1586767542 - 04/13/2020 10:45:42 Host: 113.186.124.210/113.186.124.210 Port: 445 TCP Blocked
2020-04-13 17:08:35
118.174.219.232 attackspam
Apr 13 10:37:35 srv-ubuntu-dev3 sshd[62378]: Invalid user test from 118.174.219.232
Apr 13 10:37:35 srv-ubuntu-dev3 sshd[62378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.219.232
Apr 13 10:37:35 srv-ubuntu-dev3 sshd[62378]: Invalid user test from 118.174.219.232
Apr 13 10:37:37 srv-ubuntu-dev3 sshd[62378]: Failed password for invalid user test from 118.174.219.232 port 54916 ssh2
Apr 13 10:41:35 srv-ubuntu-dev3 sshd[63036]: Invalid user brukernavn from 118.174.219.232
Apr 13 10:41:35 srv-ubuntu-dev3 sshd[63036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.219.232
Apr 13 10:41:35 srv-ubuntu-dev3 sshd[63036]: Invalid user brukernavn from 118.174.219.232
Apr 13 10:41:37 srv-ubuntu-dev3 sshd[63036]: Failed password for invalid user brukernavn from 118.174.219.232 port 38424 ssh2
Apr 13 10:45:33 srv-ubuntu-dev3 sshd[63671]: Invalid user git from 118.174.219.232
...
2020-04-13 17:33:51
41.185.73.242 attackbots
Apr 13 10:59:08 host01 sshd[27461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.185.73.242 
Apr 13 10:59:10 host01 sshd[27461]: Failed password for invalid user meryem from 41.185.73.242 port 33160 ssh2
Apr 13 11:03:38 host01 sshd[28361]: Failed password for root from 41.185.73.242 port 41034 ssh2
...
2020-04-13 17:07:40
186.225.176.34 attackbots
Unauthorized connection attempt from IP address 186.225.176.34 on Port 445(SMB)
2020-04-13 17:13:30
185.97.116.165 attackspam
Apr 13 10:49:58 srv01 sshd[27884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.97.116.165  user=root
Apr 13 10:50:00 srv01 sshd[27884]: Failed password for root from 185.97.116.165 port 39130 ssh2
Apr 13 10:51:46 srv01 sshd[27988]: Invalid user ailise from 185.97.116.165 port 34926
Apr 13 10:51:46 srv01 sshd[27988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.97.116.165
Apr 13 10:51:46 srv01 sshd[27988]: Invalid user ailise from 185.97.116.165 port 34926
Apr 13 10:51:48 srv01 sshd[27988]: Failed password for invalid user ailise from 185.97.116.165 port 34926 ssh2
...
2020-04-13 17:21:13

Recently Reported IPs

30.93.109.218 249.203.15.104 60.14.126.108 122.140.165.122
3.16.169.158 2.254.7.19 35.161.203.109 97.197.109.144
35.208.1.147 31.150.129.202 127.19.10.79 208.9.1.202
30.47.150.48 76.100.137.137 33.243.103.133 224.187.2.180
30.108.154.158 250.206.49.15 74.112.234.97 241.23.2.180