Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
149.28.249.74 attackspambots
1588421443 - 05/02/2020 14:10:43 Host: 149.28.249.74/149.28.249.74 Port: 445 TCP Blocked
2020-05-03 00:48:22
149.28.249.122 attackspam
Oct 13 09:08:53 dedicated sshd[1734]: Invalid user Windows@xp from 149.28.249.122 port 50062
2019-10-13 17:09:04
149.28.249.122 attackspambots
Oct 11 18:59:08 localhost sshd\[65038\]: Invalid user 123Bet from 149.28.249.122 port 35310
Oct 11 18:59:08 localhost sshd\[65038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.28.249.122
Oct 11 18:59:10 localhost sshd\[65038\]: Failed password for invalid user 123Bet from 149.28.249.122 port 35310 ssh2
Oct 11 19:02:53 localhost sshd\[65175\]: Invalid user Senha!qaz from 149.28.249.122 port 56668
Oct 11 19:02:53 localhost sshd\[65175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.28.249.122
...
2019-10-12 06:19:03
149.28.249.164 attack
*Port Scan* detected from 149.28.249.164 (US/United States/149.28.249.164.vultr.com). 4 hits in the last 205 seconds
2019-07-08 06:31:58
149.28.249.164 attackspam
Probing for vulnerable services
2019-07-05 13:36:08
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.28.249.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 313
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.28.249.78.			IN	A

;; AUTHORITY SECTION:
.			249	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 98 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 04:35:55 CST 2022
;; MSG SIZE  rcvd: 106
Host info
78.249.28.149.in-addr.arpa domain name pointer ns1.dlpserver.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
78.249.28.149.in-addr.arpa	name = ns1.dlpserver.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
123.207.241.223 attack
Apr 11 22:55:50 h2829583 sshd[6365]: Failed password for root from 123.207.241.223 port 35744 ssh2
2020-04-12 06:22:04
222.186.30.167 attack
Apr 11 18:37:54 firewall sshd[1835]: Failed password for root from 222.186.30.167 port 35216 ssh2
Apr 11 18:37:57 firewall sshd[1835]: Failed password for root from 222.186.30.167 port 35216 ssh2
Apr 11 18:37:59 firewall sshd[1835]: Failed password for root from 222.186.30.167 port 35216 ssh2
...
2020-04-12 05:42:23
94.102.56.215 attack
94.102.56.215 was recorded 23 times by 14 hosts attempting to connect to the following ports: 1797,1813. Incident counter (4h, 24h, all-time): 23, 137, 10847
2020-04-12 06:21:21
183.89.212.81 attack
Dovecot Invalid User Login Attempt.
2020-04-12 06:08:02
222.186.30.57 attack
11.04.2020 22:10:48 SSH access blocked by firewall
2020-04-12 06:11:05
222.186.180.9 attackspam
2020-04-12T00:00:27.173501centos sshd[20934]: Failed password for root from 222.186.180.9 port 56048 ssh2
2020-04-12T00:00:30.877025centos sshd[20934]: Failed password for root from 222.186.180.9 port 56048 ssh2
2020-04-12T00:00:34.386844centos sshd[20934]: Failed password for root from 222.186.180.9 port 56048 ssh2
...
2020-04-12 06:06:51
112.35.130.177 attackbotsspam
SSH Invalid Login
2020-04-12 06:24:40
121.36.125.167 attackspam
Apr 11 22:52:21 OPSO sshd\[5780\]: Invalid user test from 121.36.125.167 port 59910
Apr 11 22:52:21 OPSO sshd\[5780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.36.125.167
Apr 11 22:52:23 OPSO sshd\[5780\]: Failed password for invalid user test from 121.36.125.167 port 59910 ssh2
Apr 11 22:55:59 OPSO sshd\[7073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.36.125.167  user=root
Apr 11 22:56:01 OPSO sshd\[7073\]: Failed password for root from 121.36.125.167 port 59062 ssh2
2020-04-12 06:17:15
117.50.97.216 attackbotsspam
Apr 11 23:44:14 eventyay sshd[5445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.97.216
Apr 11 23:44:16 eventyay sshd[5445]: Failed password for invalid user weagle from 117.50.97.216 port 42346 ssh2
Apr 11 23:50:15 eventyay sshd[5767]: Failed password for root from 117.50.97.216 port 45168 ssh2
...
2020-04-12 06:11:23
5.89.10.81 attack
Apr 11 22:40:42: Invalid user postgres from 5.89.10.81 port 53354
2020-04-12 06:19:03
91.160.119.120 attackbotsspam
(sshd) Failed SSH login from 91.160.119.120 (FR/France/Ille-et-Vilaine/Montgermont/91-160-119-120.subs.proxad.net/-): 1 in the last 3600 secs
2020-04-12 05:43:17
223.240.84.49 attack
SSH Invalid Login
2020-04-12 05:56:43
181.65.164.179 attackspam
SSH Invalid Login
2020-04-12 06:14:01
187.38.26.173 attackspambots
IP blocked
2020-04-12 06:05:47
87.104.49.5 attackbots
Apr 11 23:34:09 *host* sshd\[9424\]: User *user* from 87.104.49.5 not allowed because none of user's groups are listed in AllowGroups
2020-04-12 05:51:35

Recently Reported IPs

149.28.248.69 149.28.250.57 149.28.249.167 149.28.254.222
149.28.249.70 149.28.255.192 149.28.255.32 149.28.32.30
149.28.36.175 149.28.36.220 149.28.36.23 149.28.37.55
149.28.37.60 149.28.39.229 149.28.41.17 149.28.39.151
149.28.45.107 149.28.45.126 149.28.48.43 149.28.48.19