Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.243.133.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32516
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.243.133.68.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 14:04:03 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 68.133.243.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.133.243.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.11.52.241 attackbotsspam
Aug 27 01:37:39 lvps92-51-164-246 sshd[9512]: Invalid user ubnt from 37.11.52.241
Aug 27 01:37:41 lvps92-51-164-246 sshd[9512]: Failed password for invalid user ubnt from 37.11.52.241 port 47936 ssh2
Aug 27 01:37:43 lvps92-51-164-246 sshd[9512]: Failed password for invalid user ubnt from 37.11.52.241 port 47936 ssh2
Aug 27 01:37:45 lvps92-51-164-246 sshd[9512]: Failed password for invalid user ubnt from 37.11.52.241 port 47936 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=37.11.52.241
2019-08-27 09:11:38
54.37.232.108 attackbotsspam
Aug 26 14:42:44 aiointranet sshd\[9275\]: Invalid user kubernetes from 54.37.232.108
Aug 26 14:42:44 aiointranet sshd\[9275\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.ip-54-37-232.eu
Aug 26 14:42:46 aiointranet sshd\[9275\]: Failed password for invalid user kubernetes from 54.37.232.108 port 46118 ssh2
Aug 26 14:46:52 aiointranet sshd\[9694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.ip-54-37-232.eu  user=root
Aug 26 14:46:54 aiointranet sshd\[9694\]: Failed password for root from 54.37.232.108 port 35262 ssh2
2019-08-27 09:07:10
186.228.60.22 attackbotsspam
Aug 26 15:14:52 lcprod sshd\[27501\]: Invalid user admin from 186.228.60.22
Aug 26 15:14:52 lcprod sshd\[27501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.228.60.22
Aug 26 15:14:55 lcprod sshd\[27501\]: Failed password for invalid user admin from 186.228.60.22 port 54374 ssh2
Aug 26 15:19:56 lcprod sshd\[27944\]: Invalid user csgoserver from 186.228.60.22
Aug 26 15:19:56 lcprod sshd\[27944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.228.60.22
2019-08-27 09:32:33
92.222.181.159 attackbotsspam
2019-08-27T03:36:12.849655centos sshd\[25077\]: Invalid user httpd from 92.222.181.159 port 50475
2019-08-27T03:36:12.853966centos sshd\[25077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.ip-92-222-181.eu
2019-08-27T03:36:14.287173centos sshd\[25077\]: Failed password for invalid user httpd from 92.222.181.159 port 50475 ssh2
2019-08-27 09:45:10
192.99.36.76 attackspambots
2019-08-27T01:14:50.727861abusebot.cloudsearch.cf sshd\[16337\]: Invalid user myftp from 192.99.36.76 port 36796
2019-08-27T01:14:50.732690abusebot.cloudsearch.cf sshd\[16337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ssd2.htm-mbs.com
2019-08-27 09:32:03
41.138.88.3 attack
Aug 27 00:57:41 web8 sshd\[654\]: Invalid user nexus from 41.138.88.3
Aug 27 00:57:41 web8 sshd\[654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.138.88.3
Aug 27 00:57:43 web8 sshd\[654\]: Failed password for invalid user nexus from 41.138.88.3 port 58426 ssh2
Aug 27 01:02:25 web8 sshd\[3540\]: Invalid user student from 41.138.88.3
Aug 27 01:02:25 web8 sshd\[3540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.138.88.3
2019-08-27 09:12:41
134.175.59.235 attackspambots
Aug 27 02:47:25 eventyay sshd[11766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.59.235
Aug 27 02:47:27 eventyay sshd[11766]: Failed password for invalid user apps from 134.175.59.235 port 49977 ssh2
Aug 27 02:52:02 eventyay sshd[11862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.59.235
...
2019-08-27 09:03:09
106.13.109.19 attackspam
Aug 26 20:11:47 xtremcommunity sshd\[5295\]: Invalid user oprah from 106.13.109.19 port 48586
Aug 26 20:11:47 xtremcommunity sshd\[5295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.109.19
Aug 26 20:11:49 xtremcommunity sshd\[5295\]: Failed password for invalid user oprah from 106.13.109.19 port 48586 ssh2
Aug 26 20:14:59 xtremcommunity sshd\[5394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.109.19  user=root
Aug 26 20:15:01 xtremcommunity sshd\[5394\]: Failed password for root from 106.13.109.19 port 46122 ssh2
...
2019-08-27 09:00:28
114.207.139.203 attack
Invalid user share from 114.207.139.203 port 36244
2019-08-27 09:44:02
49.89.168.167 attackspambots
Aug 26 19:28:56 eola postfix/smtpd[4460]: connect from unknown[49.89.168.167]
Aug 26 19:28:56 eola postfix/smtpd[4458]: connect from unknown[49.89.168.167]
Aug 26 19:28:57 eola postfix/smtpd[4458]: lost connection after CONNECT from unknown[49.89.168.167]
Aug 26 19:28:57 eola postfix/smtpd[4458]: disconnect from unknown[49.89.168.167] commands=0/0
Aug 26 19:29:01 eola postfix/smtpd[4460]: lost connection after AUTH from unknown[49.89.168.167]
Aug 26 19:29:01 eola postfix/smtpd[4460]: disconnect from unknown[49.89.168.167] ehlo=1 auth=0/1 commands=1/2
Aug 26 19:29:42 eola postfix/smtpd[4458]: connect from unknown[49.89.168.167]
Aug 26 19:29:42 eola postfix/smtpd[4460]: connect from unknown[49.89.168.167]
Aug 26 19:29:43 eola postfix/smtpd[4460]: lost connection after AUTH from unknown[49.89.168.167]
Aug 26 19:29:43 eola postfix/smtpd[4460]: disconnect from unknown[49.89.168.167] ehlo=1 auth=0/1 commands=1/2
Aug 26 19:29:43 eola postfix/smtpd[4458]: lost connection after ........
-------------------------------
2019-08-27 09:08:03
106.13.39.232 attackbotsspam
Telnet Server BruteForce Attack
2019-08-27 09:22:58
77.221.21.148 attackspam
Aug 27 01:00:00 hb sshd\[29925\]: Invalid user fy from 77.221.21.148
Aug 27 01:00:00 hb sshd\[29925\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cable-77-221-21-148.dynamic.telemach.ba
Aug 27 01:00:01 hb sshd\[29925\]: Failed password for invalid user fy from 77.221.21.148 port 62757 ssh2
Aug 27 01:07:22 hb sshd\[30814\]: Invalid user ellery from 77.221.21.148
Aug 27 01:07:22 hb sshd\[30814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cable-77-221-21-148.dynamic.telemach.ba
2019-08-27 09:17:02
168.181.185.6 attackbots
Aug 27 07:12:59 our-server-hostname postfix/smtpd[5284]: connect from unknown[168.181.185.6]
Aug x@x
Aug 27 07:13:01 our-server-hostname postfix/smtpd[5284]: lost connection after RCPT from unknown[168.181.185.6]
Aug 27 07:13:01 our-server-hostname postfix/smtpd[5284]: disconnect from unknown[168.181.185.6]
Aug 27 07:14:30 our-server-hostname postfix/smtpd[5640]: connect from unknown[168.181.185.6]
Aug 27 07:14:31 our-server-hostname postfix/smtpd[5640]: NOQUEUE: reject: RCPT from unknown[168.181.185.6]: 554 5.7.1 Service unavailable; Client host [168.181.185.6] blocke
.... truncated .... 

Aug 27 07:12:59 our-server-hostname postfix/smtpd[5284]: connect from unknown[168.181.185.6]
Aug x@x
Aug 27 07:13:01 our-server-hostname postfix/smtpd[5284]: lost connection after RCPT from unknown[168.181.185.6]
Aug 27 07:13:01 our-server-hostname postfix/smtpd[5284]: disconnect from unknown[168.181.185.6]
Aug 27 07:14:30 our-server-hostname postfix/smtpd[5640]: connect from unknown........
-------------------------------
2019-08-27 09:05:29
181.143.72.66 attackspambots
Aug 26 14:48:40 tdfoods sshd\[27836\]: Invalid user csserver from 181.143.72.66
Aug 26 14:48:40 tdfoods sshd\[27836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.143.72.66
Aug 26 14:48:42 tdfoods sshd\[27836\]: Failed password for invalid user csserver from 181.143.72.66 port 35712 ssh2
Aug 26 14:53:16 tdfoods sshd\[28210\]: Invalid user adelin from 181.143.72.66
Aug 26 14:53:16 tdfoods sshd\[28210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.143.72.66
2019-08-27 09:06:22
171.25.193.25 attackbots
Aug 27 03:15:54 host sshd\[51729\]: Failed password for sshd from 171.25.193.25 port 10719 ssh2
Aug 27 03:15:57 host sshd\[51729\]: Failed password for sshd from 171.25.193.25 port 10719 ssh2
...
2019-08-27 09:17:46

Recently Reported IPs

163.240.242.183 172.154.155.128 184.84.22.132 103.91.0.67
116.140.53.52 165.38.5.17 145.82.36.222 159.222.75.24
162.202.86.97 115.178.148.79 122.9.2.252 168.246.99.27
187.153.181.165 46.118.175.50 169.217.29.9 251.172.184.253
109.23.18.249 155.8.147.38 103.204.48.161 222.117.0.137