Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.242.75.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42075
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.242.75.75.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 14:02:21 CST 2025
;; MSG SIZE  rcvd: 106
Host info
75.75.242.149.in-addr.arpa domain name pointer h4b4b.koerber.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
75.75.242.149.in-addr.arpa	name = h4b4b.koerber.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.163.181.157 attack
2019-09-07T23:53:43.539673abusebot-5.cloudsearch.cf sshd\[14744\]: Invalid user mysql2 from 118.163.181.157 port 57822
2019-09-08 07:56:50
208.64.33.123 attackspam
Jul 31 10:49:49 vtv3 sshd\[7875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.64.33.123  user=root
Jul 31 10:49:51 vtv3 sshd\[7875\]: Failed password for root from 208.64.33.123 port 59884 ssh2
Jul 31 10:56:28 vtv3 sshd\[11376\]: Invalid user mapred from 208.64.33.123 port 54500
Jul 31 10:56:28 vtv3 sshd\[11376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.64.33.123
Jul 31 10:56:30 vtv3 sshd\[11376\]: Failed password for invalid user mapred from 208.64.33.123 port 54500 ssh2
Jul 31 11:08:40 vtv3 sshd\[17235\]: Invalid user admin from 208.64.33.123 port 35994
Jul 31 11:08:40 vtv3 sshd\[17235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.64.33.123
Jul 31 11:08:43 vtv3 sshd\[17235\]: Failed password for invalid user admin from 208.64.33.123 port 35994 ssh2
Jul 31 11:12:47 vtv3 sshd\[19270\]: Invalid user wifi from 208.64.33.123 port 58128
Jul 31 11:12:47 vtv3
2019-09-08 07:30:12
49.235.250.170 attackspam
Sep  7 13:48:40 wbs sshd\[24268\]: Invalid user password from 49.235.250.170
Sep  7 13:48:40 wbs sshd\[24268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.250.170
Sep  7 13:48:43 wbs sshd\[24268\]: Failed password for invalid user password from 49.235.250.170 port 45986 ssh2
Sep  7 13:52:37 wbs sshd\[24615\]: Invalid user passw0rd from 49.235.250.170
Sep  7 13:52:37 wbs sshd\[24615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.250.170
2019-09-08 08:14:56
222.186.42.241 attack
09/07/2019-19:25:03.341606 222.186.42.241 Protocol: 6 ET SCAN Potential SSH Scan
2019-09-08 07:31:29
188.128.39.127 attackbotsspam
2019-09-07T23:26:14.506389abusebot-2.cloudsearch.cf sshd\[910\]: Invalid user tester from 188.128.39.127 port 55572
2019-09-08 07:59:20
198.251.83.42 attackspam
Sep  7 23:51:49 herz-der-gamer postfix/smtpd[15037]: warning: unknown[198.251.83.42]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  7 23:51:55 herz-der-gamer postfix/smtpd[15037]: warning: unknown[198.251.83.42]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-08 07:33:43
222.186.30.165 attackspambots
Sep  7 13:59:55 kapalua sshd\[24037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.165  user=root
Sep  7 13:59:57 kapalua sshd\[24037\]: Failed password for root from 222.186.30.165 port 61930 ssh2
Sep  7 14:00:02 kapalua sshd\[24048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.165  user=root
Sep  7 14:00:04 kapalua sshd\[24048\]: Failed password for root from 222.186.30.165 port 58922 ssh2
Sep  7 14:00:07 kapalua sshd\[24048\]: Failed password for root from 222.186.30.165 port 58922 ssh2
2019-09-08 08:01:21
82.187.186.115 attackspam
Sep  7 11:47:47 lcdev sshd\[31998\]: Invalid user 12345 from 82.187.186.115
Sep  7 11:47:47 lcdev sshd\[31998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host115-186-static.187-82-b.business.telecomitalia.it
Sep  7 11:47:49 lcdev sshd\[31998\]: Failed password for invalid user 12345 from 82.187.186.115 port 47266 ssh2
Sep  7 11:51:59 lcdev sshd\[32347\]: Invalid user uftp123 from 82.187.186.115
Sep  7 11:51:59 lcdev sshd\[32347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host115-186-static.187-82-b.business.telecomitalia.it
2019-09-08 07:31:06
141.98.80.80 attackspam
Sep  7 20:06:15 georgia postfix/smtpd[5751]: connect from unknown[141.98.80.80]
Sep  7 20:06:17 georgia postfix/smtpd[5751]: warning: unknown[141.98.80.80]: SASL PLAIN authentication failed: authentication failure
Sep  7 20:06:17 georgia postfix/smtpd[5751]: lost connection after AUTH from unknown[141.98.80.80]
Sep  7 20:06:17 georgia postfix/smtpd[5751]: disconnect from unknown[141.98.80.80] ehlo=1 auth=0/1 commands=1/2
Sep  7 20:06:17 georgia postfix/smtpd[6532]: connect from unknown[141.98.80.80]
Sep  7 20:06:18 georgia postfix/smtpd[6532]: warning: unknown[141.98.80.80]: SASL PLAIN authentication failed: authentication failure
Sep  7 20:06:19 georgia postfix/smtpd[6532]: lost connection after AUTH from unknown[141.98.80.80]
Sep  7 20:06:19 georgia postfix/smtpd[6532]: disconnect from unknown[141.98.80.80] ehlo=1 auth=0/1 commands=1/2
Sep  7 20:07:31 georgia postfix/smtpd[5751]: connect from unknown[141.98.80.80]
Sep  7 20:07:32 georgia postfix/smtpd[5751]: warning: ........
-------------------------------
2019-09-08 07:59:45
106.12.241.109 attackspam
Sep  8 02:25:34 tuotantolaitos sshd[18377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.241.109
Sep  8 02:25:36 tuotantolaitos sshd[18377]: Failed password for invalid user ubuntu from 106.12.241.109 port 52304 ssh2
...
2019-09-08 07:31:50
122.224.129.35 attack
Sep  8 02:36:24 taivassalofi sshd[40123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.129.35
Sep  8 02:36:26 taivassalofi sshd[40123]: Failed password for invalid user redmine from 122.224.129.35 port 40488 ssh2
...
2019-09-08 07:40:29
137.74.159.147 attackspambots
Sep  7 23:53:57 MK-Soft-VM4 sshd\[3925\]: Invalid user vbox from 137.74.159.147 port 34922
Sep  7 23:53:57 MK-Soft-VM4 sshd\[3925\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.159.147
Sep  7 23:53:59 MK-Soft-VM4 sshd\[3925\]: Failed password for invalid user vbox from 137.74.159.147 port 34922 ssh2
...
2019-09-08 08:04:21
14.232.160.213 attackspambots
Sep  7 23:57:33 hcbbdb sshd\[14360\]: Invalid user 123 from 14.232.160.213
Sep  7 23:57:33 hcbbdb sshd\[14360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.232.160.213
Sep  7 23:57:35 hcbbdb sshd\[14360\]: Failed password for invalid user 123 from 14.232.160.213 port 44810 ssh2
Sep  8 00:02:17 hcbbdb sshd\[14945\]: Invalid user 123 from 14.232.160.213
Sep  8 00:02:17 hcbbdb sshd\[14945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.232.160.213
2019-09-08 08:17:48
213.32.18.189 attackspambots
Sep  8 00:42:40 pkdns2 sshd\[64439\]: Invalid user ftp from 213.32.18.189Sep  8 00:42:43 pkdns2 sshd\[64439\]: Failed password for invalid user ftp from 213.32.18.189 port 35562 ssh2Sep  8 00:46:39 pkdns2 sshd\[64632\]: Invalid user admin01 from 213.32.18.189Sep  8 00:46:42 pkdns2 sshd\[64632\]: Failed password for invalid user admin01 from 213.32.18.189 port 51536 ssh2Sep  8 00:50:43 pkdns2 sshd\[64797\]: Invalid user upload from 213.32.18.189Sep  8 00:50:45 pkdns2 sshd\[64797\]: Failed password for invalid user upload from 213.32.18.189 port 39276 ssh2
...
2019-09-08 08:13:19
1.54.68.29 attackspam
Automatic report - Port Scan Attack
2019-09-08 07:51:20

Recently Reported IPs

196.17.78.155 69.187.67.26 190.172.4.177 108.81.255.218
23.99.115.206 3.21.189.78 224.28.192.114 26.83.171.5
199.8.229.161 69.22.172.205 93.255.50.129 244.86.203.148
160.144.144.224 36.164.99.158 53.240.36.52 122.246.11.183
61.4.24.194 244.201.94.156 241.221.74.92 123.50.225.219