Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.250.45.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 206
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.250.45.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 15:40:41 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 99.45.250.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.45.250.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.88.112.109 attackspam
SSH break in attempt
...
2020-09-09 07:31:32
222.186.31.166 attackbots
Sep  9 00:49:47 * sshd[21655]: Failed password for root from 222.186.31.166 port 50619 ssh2
2020-09-09 06:54:35
84.38.184.79 attackspambots
$f2bV_matches
2020-09-09 07:22:01
106.13.174.144 attackbots
Failed password for root from 106.13.174.144 port 41072 ssh2
2020-09-09 07:25:07
103.144.21.189 attackspambots
SSH Invalid Login
2020-09-09 07:01:21
219.153.33.234 attackbots
Sep  8 22:58:28 scw-6657dc sshd[787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.153.33.234  user=root
Sep  8 22:58:28 scw-6657dc sshd[787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.153.33.234  user=root
Sep  8 22:58:30 scw-6657dc sshd[787]: Failed password for root from 219.153.33.234 port 24091 ssh2
...
2020-09-09 07:22:34
222.186.169.194 attackspam
Sep  8 20:23:34 firewall sshd[18027]: Failed password for root from 222.186.169.194 port 28480 ssh2
Sep  8 20:23:38 firewall sshd[18027]: Failed password for root from 222.186.169.194 port 28480 ssh2
Sep  8 20:23:41 firewall sshd[18027]: Failed password for root from 222.186.169.194 port 28480 ssh2
...
2020-09-09 07:27:08
106.75.210.176 attackbotsspam
Failed password for invalid user basapp from 106.75.210.176 port 34428 ssh2
2020-09-09 07:04:31
186.211.71.24 attack
186.211.71.24 - [08/Sep/2020:20:14:23 +0300] "POST /xmlrpc.php HTTP/1.1" 404 17146 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
186.211.71.24 - [08/Sep/2020:20:21:26 +0300] "POST /xmlrpc.php HTTP/1.1" 404 17146 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
...
2020-09-09 07:00:31
49.232.5.122 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-09-09 07:20:18
195.54.160.21 attackbots
Multiport scan 17 ports : 80(x110) 443(x94) 2375(x101) 3000(x65) 4506(x39) 5601 6066 6379(x90) 6800(x90) 7070(x2) 7077(x56) 7777 8081(x187) 8088(x96) 8983(x94) 9000 50000
2020-09-09 07:18:02
106.12.78.40 attack
2020-09-08T17:28:12.5665681495-001 sshd[39772]: Invalid user uucp from 106.12.78.40 port 45536
2020-09-08T17:28:14.0733571495-001 sshd[39772]: Failed password for invalid user uucp from 106.12.78.40 port 45536 ssh2
2020-09-08T17:31:15.6115771495-001 sshd[39945]: Invalid user karen from 106.12.78.40 port 37084
2020-09-08T17:31:15.6150261495-001 sshd[39945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.78.40
2020-09-08T17:31:15.6115771495-001 sshd[39945]: Invalid user karen from 106.12.78.40 port 37084
2020-09-08T17:31:17.5752591495-001 sshd[39945]: Failed password for invalid user karen from 106.12.78.40 port 37084 ssh2
...
2020-09-09 06:58:57
195.146.59.157 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-09-09 07:31:20
213.87.44.152 attackbotsspam
Sep  8 15:16:24 ny01 sshd[5145]: Failed password for root from 213.87.44.152 port 51580 ssh2
Sep  8 15:20:18 ny01 sshd[5563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.87.44.152
Sep  8 15:20:20 ny01 sshd[5563]: Failed password for invalid user jboss from 213.87.44.152 port 57630 ssh2
2020-09-09 07:19:06
177.53.140.230 attack
(mod_security) mod_security (id:211210) triggered by 177.53.140.230 (BR/Brazil/host140-230.viabrs.com.br): 5 in the last 3600 secs
2020-09-09 07:11:17

Recently Reported IPs

66.1.113.234 179.74.15.134 178.158.128.89 186.171.210.63
197.241.190.86 77.123.187.162 188.165.123.190 186.50.152.168
194.182.36.62 99.101.251.183 92.177.94.226 71.47.156.16
182.133.154.76 95.34.119.52 221.230.38.232 133.188.181.74
30.159.4.92 119.19.156.110 251.236.133.98 233.206.197.152