Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.28.222.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42350
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.28.222.205.			IN	A

;; AUTHORITY SECTION:
.			166	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:49:19 CST 2022
;; MSG SIZE  rcvd: 107
Host info
205.222.28.149.in-addr.arpa domain name pointer 149.28.222.205.vultr.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
205.222.28.149.in-addr.arpa	name = 149.28.222.205.vultr.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
195.154.108.203 attack
Sep 29 15:41:41 mail sshd\[30330\]: Failed password for root from 195.154.108.203 port 43376 ssh2
Sep 29 15:45:48 mail sshd\[30748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.108.203  user=nagios
Sep 29 15:45:50 mail sshd\[30748\]: Failed password for nagios from 195.154.108.203 port 55604 ssh2
Sep 29 15:49:51 mail sshd\[31144\]: Invalid user lenox from 195.154.108.203 port 39610
Sep 29 15:49:51 mail sshd\[31144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.108.203
2019-09-30 03:26:41
201.140.209.33 attackspam
Unauthorized connection attempt from IP address 201.140.209.33 on Port 445(SMB)
2019-09-30 03:13:51
190.11.66.197 attackspambots
Unauthorized connection attempt from IP address 190.11.66.197 on Port 445(SMB)
2019-09-30 03:15:48
221.7.213.133 attack
Sep 29 08:52:05 tdfoods sshd\[10401\]: Invalid user cron from 221.7.213.133
Sep 29 08:52:05 tdfoods sshd\[10401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.7.213.133
Sep 29 08:52:06 tdfoods sshd\[10401\]: Failed password for invalid user cron from 221.7.213.133 port 45647 ssh2
Sep 29 08:54:24 tdfoods sshd\[10603\]: Invalid user vdapp from 221.7.213.133
Sep 29 08:54:24 tdfoods sshd\[10603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.7.213.133
2019-09-30 03:19:24
103.9.22.67 attackbots
Unauthorized connection attempt from IP address 103.9.22.67 on Port 445(SMB)
2019-09-30 03:39:20
166.70.207.2 attack
Sep 29 21:04:38 rotator sshd\[29765\]: Failed password for root from 166.70.207.2 port 39356 ssh2Sep 29 21:04:41 rotator sshd\[29765\]: Failed password for root from 166.70.207.2 port 39356 ssh2Sep 29 21:04:43 rotator sshd\[29765\]: Failed password for root from 166.70.207.2 port 39356 ssh2Sep 29 21:04:46 rotator sshd\[29765\]: Failed password for root from 166.70.207.2 port 39356 ssh2Sep 29 21:04:49 rotator sshd\[29765\]: Failed password for root from 166.70.207.2 port 39356 ssh2Sep 29 21:04:52 rotator sshd\[29765\]: Failed password for root from 166.70.207.2 port 39356 ssh2
...
2019-09-30 03:17:48
220.191.231.194 attackspam
Unauthorized connection attempt from IP address 220.191.231.194 on Port 445(SMB)
2019-09-30 03:17:35
116.22.28.67 attack
Automated reporting of FTP Brute Force
2019-09-30 03:40:47
45.77.3.107 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/45.77.3.107/ 
 US - 1H : (1521)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN20473 
 
 IP : 45.77.3.107 
 
 CIDR : 45.77.0.0/21 
 
 PREFIX COUNT : 584 
 
 UNIQUE IP COUNT : 939776 
 
 
 WYKRYTE ATAKI Z ASN20473 :  
  1H - 4 
  3H - 7 
  6H - 10 
 12H - 13 
 24H - 27 
 
 INFO : Looking for resource vulnerabilities 403 Detected and Blocked by ADMIN  - data recovery
2019-09-30 03:34:12
125.214.58.84 attackspambots
Unauthorized connection attempt from IP address 125.214.58.84 on Port 445(SMB)
2019-09-30 03:28:05
182.61.130.121 attackbotsspam
Sep 29 06:13:56 php1 sshd\[17764\]: Invalid user milo from 182.61.130.121
Sep 29 06:13:56 php1 sshd\[17764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.130.121
Sep 29 06:13:58 php1 sshd\[17764\]: Failed password for invalid user milo from 182.61.130.121 port 43802 ssh2
Sep 29 06:19:32 php1 sshd\[18292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.130.121  user=root
Sep 29 06:19:34 php1 sshd\[18292\]: Failed password for root from 182.61.130.121 port 25471 ssh2
2019-09-30 03:39:52
34.200.213.198 attackspam
Sep 29 13:36:15 server2 sshd[13286]: Did not receive identification string from 34.200.213.198
Sep 29 13:37:57 server2 sshd[13343]: Did not receive identification string from 34.200.213.198
Sep 29 13:38:33 server2 sshd[13412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-34-200-213-198.compute-1.amazonaws.com  user=r.r
Sep 29 13:38:35 server2 sshd[13412]: Failed password for r.r from 34.200.213.198 port 59712 ssh2
Sep 29 13:38:35 server2 sshd[13412]: Received disconnect from 34.200.213.198: 11: Bye Bye [preauth]
Sep 29 13:39:16 server2 sshd[13566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-34-200-213-198.compute-1.amazonaws.com  user=r.r
Sep 29 13:39:18 server2 sshd[13566]: Failed password for r.r from 34.200.213.198 port 43492 ssh2
Sep 29 13:39:20 server2 sshd[13566]: Received disconnect from 34.200.213.198: 11: Bye Bye [preauth]
Sep 29 13:40:40 server2 sshd[13729]: Did not........
-------------------------------
2019-09-30 03:19:01
81.106.220.20 attackspam
Sep 29 14:53:23 web8 sshd\[23867\]: Invalid user ftp from 81.106.220.20
Sep 29 14:53:23 web8 sshd\[23867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.106.220.20
Sep 29 14:53:24 web8 sshd\[23867\]: Failed password for invalid user ftp from 81.106.220.20 port 47408 ssh2
Sep 29 14:57:51 web8 sshd\[26038\]: Invalid user Samuli from 81.106.220.20
Sep 29 14:57:51 web8 sshd\[26038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.106.220.20
2019-09-30 03:41:12
85.25.109.12 attack
Sep 29 18:36:00 core sshd[29276]: Invalid user admin from 85.25.109.12 port 4361
Sep 29 18:36:03 core sshd[29276]: Failed password for invalid user admin from 85.25.109.12 port 4361 ssh2
...
2019-09-30 03:43:32
118.91.178.52 attackbots
Unauthorized connection attempt from IP address 118.91.178.52 on Port 445(SMB)
2019-09-30 03:45:49

Recently Reported IPs

149.28.207.3 149.28.231.0 149.28.226.239 149.28.238.71
149.28.233.52 149.28.235.242 149.28.233.197 149.28.246.62
149.28.239.193 149.28.25.56 149.28.243.249 149.28.252.114
149.28.250.60 149.28.246.66 149.28.253.111 149.28.33.143
149.28.255.77 149.28.34.85 149.28.37.65 149.28.40.137