Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.240.100.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5171
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.240.100.169.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 10:49:42 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 169.100.240.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 169.100.240.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
156.236.119.166 attack
Automatic report - SSH Brute-Force Attack
2020-02-13 23:03:58
51.38.64.40 attackbots
2020-02-13T15:50:01.502364scmdmz1 sshd[27706]: Invalid user asnur from 51.38.64.40 port 45648
2020-02-13T15:50:01.506052scmdmz1 sshd[27706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.ip-51-38-64.eu
2020-02-13T15:50:01.502364scmdmz1 sshd[27706]: Invalid user asnur from 51.38.64.40 port 45648
2020-02-13T15:50:03.099615scmdmz1 sshd[27706]: Failed password for invalid user asnur from 51.38.64.40 port 45648 ssh2
2020-02-13T15:53:11.060459scmdmz1 sshd[27999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.ip-51-38-64.eu  user=root
2020-02-13T15:53:13.068538scmdmz1 sshd[27999]: Failed password for root from 51.38.64.40 port 46128 ssh2
...
2020-02-13 23:05:40
39.37.211.49 attack
1581601793 - 02/13/2020 14:49:53 Host: 39.37.211.49/39.37.211.49 Port: 22 TCP Blocked
2020-02-13 22:47:27
85.172.107.10 attack
Feb 13 15:44:04 lukav-desktop sshd\[6113\]: Invalid user bei from 85.172.107.10
Feb 13 15:44:04 lukav-desktop sshd\[6113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.172.107.10
Feb 13 15:44:07 lukav-desktop sshd\[6113\]: Failed password for invalid user bei from 85.172.107.10 port 47378 ssh2
Feb 13 15:49:42 lukav-desktop sshd\[6142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.172.107.10  user=root
Feb 13 15:49:44 lukav-desktop sshd\[6142\]: Failed password for root from 85.172.107.10 port 48746 ssh2
2020-02-13 22:43:21
138.246.253.21 attack
Port scan on 1 port(s): 53
2020-02-13 23:20:48
182.253.8.160 attack
20/2/13@08:49:36: FAIL: Alarm-Network address from=182.253.8.160
...
2020-02-13 23:06:23
49.65.161.238 attack
Portscan or hack attempt detected by psad/fwsnort
2020-02-13 22:52:18
173.245.202.210 attackbots
[2020-02-13 09:55:45] NOTICE[1148] chan_sip.c: Registration from '' failed for '173.245.202.210:63069' - Wrong password
[2020-02-13 09:55:45] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-02-13T09:55:45.012-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="17454",SessionID="0x7fd82ca712e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/173.245.202.210/63069",Challenge="16092da7",ReceivedChallenge="16092da7",ReceivedHash="b2ab3c9c3890b1acedf2be7802d85821"
[2020-02-13 09:56:10] NOTICE[1148] chan_sip.c: Registration from '' failed for '173.245.202.210:64140' - Wrong password
[2020-02-13 09:56:10] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-02-13T09:56:10.518-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="13750",SessionID="0x7fd82c57aa58",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/173
...
2020-02-13 22:58:52
103.61.37.231 attack
Feb 13 14:49:24 * sshd[30894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.61.37.231
Feb 13 14:49:26 * sshd[30894]: Failed password for invalid user rnashcroft from 103.61.37.231 port 33117 ssh2
2020-02-13 23:21:03
67.205.191.187 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-13 22:36:48
61.216.131.31 attackbotsspam
2020-02-13T15:18:56.889642scmdmz1 sshd[24372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61-216-131-31.hinet-ip.hinet.net  user=root
2020-02-13T15:18:59.114405scmdmz1 sshd[24372]: Failed password for root from 61.216.131.31 port 34494 ssh2
2020-02-13T15:22:01.563889scmdmz1 sshd[24638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61-216-131-31.hinet-ip.hinet.net  user=root
2020-02-13T15:22:03.185950scmdmz1 sshd[24638]: Failed password for root from 61.216.131.31 port 33744 ssh2
2020-02-13T15:25:16.405443scmdmz1 sshd[24996]: Invalid user yuanwd from 61.216.131.31 port 33002
...
2020-02-13 22:41:53
62.1.61.93 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2020-02-13 23:20:33
107.6.183.227 attackspam
firewall-block, port(s): 22/tcp
2020-02-13 22:32:44
95.55.234.58 attackbots
Telnet/23 MH Probe, BF, Hack -
2020-02-13 22:59:58
202.43.168.72 attackbotsspam
IMAP brute force
...
2020-02-13 23:19:26

Recently Reported IPs

180.78.253.113 62.194.130.166 168.151.93.111 97.177.202.89
209.227.109.44 46.41.120.76 96.0.71.233 75.219.77.79
150.241.4.74 110.246.126.217 74.129.217.31 92.36.42.97
69.85.21.169 212.205.75.225 5.105.164.149 62.182.249.165
115.173.209.58 124.83.175.66 49.189.31.11 249.169.168.162