Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.244.135.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24412
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.244.135.16.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012101 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 02:44:37 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 16.135.244.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 16.135.244.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.191 attackspambots
Jul 18 13:16:10 Ubuntu-1404-trusty-64-minimal sshd\[8255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.191  user=root
Jul 18 13:16:11 Ubuntu-1404-trusty-64-minimal sshd\[8255\]: Failed password for root from 218.92.0.191 port 41129 ssh2
Jul 18 13:17:58 Ubuntu-1404-trusty-64-minimal sshd\[8619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.191  user=root
Jul 18 13:18:00 Ubuntu-1404-trusty-64-minimal sshd\[8619\]: Failed password for root from 218.92.0.191 port 60954 ssh2
Jul 18 13:18:02 Ubuntu-1404-trusty-64-minimal sshd\[8619\]: Failed password for root from 218.92.0.191 port 60954 ssh2
2019-07-18 20:49:45
202.79.24.226 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 09:37:38,600 INFO [amun_request_handler] PortScan Detected on Port: 445 (202.79.24.226)
2019-07-18 21:00:50
66.249.79.10 attack
Automatic report - Banned IP Access
2019-07-18 21:14:21
223.225.16.13 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 09:37:11,370 INFO [amun_request_handler] PortScan Detected on Port: 445 (223.225.16.13)
2019-07-18 21:06:28
182.18.162.136 attackbotsspam
Jul 18 14:35:34 localhost sshd\[17536\]: Invalid user rsync from 182.18.162.136 port 52036
Jul 18 14:35:34 localhost sshd\[17536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.18.162.136
Jul 18 14:35:36 localhost sshd\[17536\]: Failed password for invalid user rsync from 182.18.162.136 port 52036 ssh2
2019-07-18 20:45:07
94.68.105.151 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-18 20:48:25
213.182.93.172 attackbotsspam
Jul 18 04:32:10 home sshd[22328]: Invalid user remotos from 213.182.93.172 port 36600
Jul 18 04:32:10 home sshd[22328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.182.93.172
Jul 18 04:32:10 home sshd[22328]: Invalid user remotos from 213.182.93.172 port 36600
Jul 18 04:32:12 home sshd[22328]: Failed password for invalid user remotos from 213.182.93.172 port 36600 ssh2
Jul 18 04:43:04 home sshd[22419]: Invalid user antonio from 213.182.93.172 port 42639
Jul 18 04:43:04 home sshd[22419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.182.93.172
Jul 18 04:43:04 home sshd[22419]: Invalid user antonio from 213.182.93.172 port 42639
Jul 18 04:43:06 home sshd[22419]: Failed password for invalid user antonio from 213.182.93.172 port 42639 ssh2
Jul 18 04:47:54 home sshd[22487]: Invalid user nice from 213.182.93.172 port 42032
Jul 18 04:47:54 home sshd[22487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0
2019-07-18 20:51:47
45.70.134.249 attack
Jul 18 14:29:32 eventyay sshd[22833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.70.134.249
Jul 18 14:29:35 eventyay sshd[22833]: Failed password for invalid user jacky from 45.70.134.249 port 57526 ssh2
Jul 18 14:36:22 eventyay sshd[24360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.70.134.249
...
2019-07-18 20:38:22
94.231.186.42 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-18 21:21:14
185.216.25.100 attackspam
Jul 18 13:51:46 localhost sshd\[7235\]: Invalid user master from 185.216.25.100 port 58678
Jul 18 13:51:46 localhost sshd\[7235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.216.25.100
...
2019-07-18 21:08:02
52.194.108.139 attackspambots
???????? ?????? <17oUa10L50LNl7Vrydt@b6gdzqd4qtm3bn3c9c.changeconditions.com> 
1wL8O4Aiw0dW76L@lfspcuk.uk 
??́?????? ????? ??????? ?????? ?? ????????? ?? ??????
2019-07-18 20:56:40
180.154.184.98 attack
2019-07-18T13:04:56.391851abusebot-7.cloudsearch.cf sshd\[21054\]: Invalid user lucas from 180.154.184.98 port 37835
2019-07-18 21:07:00
177.93.69.3 attackbotsspam
Jul 18 13:57:18 srv-4 sshd\[28801\]: Invalid user admin from 177.93.69.3
Jul 18 13:57:18 srv-4 sshd\[28801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.93.69.3
Jul 18 13:57:21 srv-4 sshd\[28801\]: Failed password for invalid user admin from 177.93.69.3 port 53657 ssh2
...
2019-07-18 20:34:37
95.164.50.126 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-18 20:32:47
85.236.178.2 attackspambots
Automatic report - Banned IP Access
2019-07-18 20:42:18

Recently Reported IPs

217.35.212.244 200.125.127.77 192.25.209.215 132.83.78.160
93.134.149.154 84.227.188.230 176.238.243.171 239.209.69.127
17.215.69.162 236.187.74.212 30.44.77.113 208.31.208.178
129.206.92.4 64.249.8.90 26.116.153.103 204.9.117.251
191.81.104.17 234.1.147.94 126.74.255.48 108.25.59.51