Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.244.72.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54059
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.244.72.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 13:44:59 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 134.72.244.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.72.244.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
27.223.89.238 attack
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-18 22:42:52
176.240.160.158 attackbots
Automatic report - XMLRPC Attack
2020-06-18 22:28:00
46.238.53.245 attackspambots
Jun 18 14:20:21 h2779839 sshd[20063]: Invalid user site from 46.238.53.245 port 50240
Jun 18 14:20:21 h2779839 sshd[20063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.238.53.245
Jun 18 14:20:21 h2779839 sshd[20063]: Invalid user site from 46.238.53.245 port 50240
Jun 18 14:20:23 h2779839 sshd[20063]: Failed password for invalid user site from 46.238.53.245 port 50240 ssh2
Jun 18 14:23:32 h2779839 sshd[20137]: Invalid user sergio from 46.238.53.245 port 48952
Jun 18 14:23:32 h2779839 sshd[20137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.238.53.245
Jun 18 14:23:32 h2779839 sshd[20137]: Invalid user sergio from 46.238.53.245 port 48952
Jun 18 14:23:34 h2779839 sshd[20137]: Failed password for invalid user sergio from 46.238.53.245 port 48952 ssh2
Jun 18 14:26:49 h2779839 sshd[20226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.238.53.245  user=ro
...
2020-06-18 22:46:54
36.67.253.135 attack
DATE:2020-06-18 14:08:12, IP:36.67.253.135, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq)
2020-06-18 22:17:31
218.92.0.173 attackspam
Jun 18 16:30:06 mail sshd\[14552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173  user=root
Jun 18 16:30:08 mail sshd\[14552\]: Failed password for root from 218.92.0.173 port 52479 ssh2
Jun 18 16:30:26 mail sshd\[14555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173  user=root
...
2020-06-18 22:31:32
163.172.178.167 attackbotsspam
Jun 18 13:11:46 jumpserver sshd[130083]: Invalid user develop from 163.172.178.167 port 55780
Jun 18 13:11:48 jumpserver sshd[130083]: Failed password for invalid user develop from 163.172.178.167 port 55780 ssh2
Jun 18 13:15:19 jumpserver sshd[130125]: Invalid user oracle from 163.172.178.167 port 55606
...
2020-06-18 22:24:17
123.206.104.162 attackbotsspam
Jun 18 12:03:54 124388 sshd[9940]: Failed password for invalid user lab from 123.206.104.162 port 50812 ssh2
Jun 18 12:08:18 124388 sshd[10257]: Invalid user kir from 123.206.104.162 port 39396
Jun 18 12:08:18 124388 sshd[10257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.104.162
Jun 18 12:08:18 124388 sshd[10257]: Invalid user kir from 123.206.104.162 port 39396
Jun 18 12:08:20 124388 sshd[10257]: Failed password for invalid user kir from 123.206.104.162 port 39396 ssh2
2020-06-18 22:14:06
14.185.16.146 attackspambots
20/6/18@08:07:44: FAIL: Alarm-Network address from=14.185.16.146
...
2020-06-18 22:47:28
117.50.107.175 attackspambots
" "
2020-06-18 22:38:40
180.76.236.65 attackspambots
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-06-18 22:12:00
59.44.37.156 attackbots
06/18/2020-10:15:39.651875 59.44.37.156 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-06-18 22:33:59
62.57.192.50 attackspam
(sshd) Failed SSH login from 62.57.192.50 (ES/Spain/62.57.192.50.dyn.user.ono.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 18 13:47:04 amsweb01 sshd[20083]: Invalid user gem from 62.57.192.50 port 53290
Jun 18 13:47:05 amsweb01 sshd[20083]: Failed password for invalid user gem from 62.57.192.50 port 53290 ssh2
Jun 18 14:00:35 amsweb01 sshd[22299]: Invalid user factorio from 62.57.192.50 port 42578
Jun 18 14:00:37 amsweb01 sshd[22299]: Failed password for invalid user factorio from 62.57.192.50 port 42578 ssh2
Jun 18 14:08:05 amsweb01 sshd[23281]: Invalid user ubuntu from 62.57.192.50 port 50508
2020-06-18 22:27:02
181.57.152.138 attackspam
Jun 18 08:08:21 ny01 sshd[28906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.57.152.138
Jun 18 08:08:21 ny01 sshd[28907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.57.152.138
Jun 18 08:08:23 ny01 sshd[28906]: Failed password for invalid user pi from 181.57.152.138 port 38002 ssh2
2020-06-18 22:10:15
14.248.90.165 attack
'IP reached maximum auth failures for a one day block'
2020-06-18 22:43:20
85.107.100.124 attackbots
Automatic report - XMLRPC Attack
2020-06-18 22:16:32

Recently Reported IPs

181.239.73.69 58.232.42.174 83.71.183.72 204.55.123.226
255.159.43.114 28.107.253.62 145.157.45.151 67.144.117.108
211.64.65.40 236.139.135.71 227.41.226.189 24.134.94.55
117.163.212.70 219.181.166.180 21.142.218.81 38.26.24.178
114.18.167.90 211.153.73.169 231.43.181.211 180.86.23.14