Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sant Adrià de Besòs

Region: Catalonia

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
149.34.21.141 attackbots
Sep 19 20:00:47 scw-focused-cartwright sshd[29751]: Failed password for root from 149.34.21.141 port 50867 ssh2
Sep 19 20:00:47 scw-focused-cartwright sshd[29753]: Failed password for root from 149.34.21.141 port 50890 ssh2
2020-09-20 22:42:52
149.34.21.141 attack
Sep 19 20:00:47 scw-focused-cartwright sshd[29751]: Failed password for root from 149.34.21.141 port 50867 ssh2
Sep 19 20:00:47 scw-focused-cartwright sshd[29753]: Failed password for root from 149.34.21.141 port 50890 ssh2
2020-09-20 14:34:04
149.34.21.141 attackspam
Sep 19 20:00:47 scw-focused-cartwright sshd[29751]: Failed password for root from 149.34.21.141 port 50867 ssh2
Sep 19 20:00:47 scw-focused-cartwright sshd[29753]: Failed password for root from 149.34.21.141 port 50890 ssh2
2020-09-20 06:33:27
149.34.20.153 attackspambots
Sep 17 14:00:55 logopedia-1vcpu-1gb-nyc1-01 sshd[377122]: Failed password for root from 149.34.20.153 port 44700 ssh2
...
2020-09-18 21:48:08
149.34.20.153 attack
Sep 17 14:00:55 logopedia-1vcpu-1gb-nyc1-01 sshd[377122]: Failed password for root from 149.34.20.153 port 44700 ssh2
...
2020-09-18 14:04:15
149.34.20.153 attack
Sep 17 14:00:55 logopedia-1vcpu-1gb-nyc1-01 sshd[377122]: Failed password for root from 149.34.20.153 port 44700 ssh2
...
2020-09-18 04:23:01
149.34.22.155 attack
Port Scan detected!
...
2020-06-23 20:53:33
149.34.23.66 attackbotsspam
 TCP (SYN) 149.34.23.66:29224 -> port 23, len 40
2020-05-27 05:09:37
149.34.24.140 attackbots
Port 22 Scan, PTR: None
2019-12-24 23:15:20
149.34.24.140 attackspam
SSH/22 MH Probe, BF, Hack -
2019-12-23 16:39:05
149.34.20.26 attackbots
Unauthorized connection attempt detected from IP address 149.34.20.26 to port 5555
2019-12-17 08:27:28
149.34.28.19 attackspambots
firewall-block, port(s): 5555/tcp
2019-10-07 15:00:49
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.34.2.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13432
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.34.2.39.			IN	A

;; AUTHORITY SECTION:
.			133	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061901 1800 900 604800 86400

;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 20 15:28:02 CST 2022
;; MSG SIZE  rcvd: 104
Host info
39.2.34.149.in-addr.arpa domain name pointer cli-95220227.wholesale.adamo.es.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
39.2.34.149.in-addr.arpa	name = cli-95220227.wholesale.adamo.es.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
220.90.31.133 attackspambots
Fail2Ban Ban Triggered
2020-02-17 05:55:13
62.210.73.82 attack
ssh brute force
2020-02-17 06:10:32
95.84.146.201 attackspam
Feb 16 06:30:12 auw2 sshd\[13801\]: Invalid user jonatan from 95.84.146.201
Feb 16 06:30:12 auw2 sshd\[13801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=broadband-95-84-146-201.ip.moscow.rt.ru
Feb 16 06:30:14 auw2 sshd\[13801\]: Failed password for invalid user jonatan from 95.84.146.201 port 55258 ssh2
Feb 16 06:33:06 auw2 sshd\[14114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=broadband-95-84-146-201.ip.moscow.rt.ru  user=root
Feb 16 06:33:09 auw2 sshd\[14114\]: Failed password for root from 95.84.146.201 port 51770 ssh2
2020-02-17 06:06:03
130.61.118.231 attack
$f2bV_matches
2020-02-17 05:33:01
97.92.23.184 attackspam
Feb 16 22:37:06 ns37 sshd[7576]: Failed password for root from 97.92.23.184 port 59034 ssh2
Feb 16 22:37:06 ns37 sshd[7576]: Failed password for root from 97.92.23.184 port 59034 ssh2
Feb 16 22:41:01 ns37 sshd[7875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.92.23.184
2020-02-17 05:56:01
180.76.135.236 attack
Feb 16 14:42:14 * sshd[3512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.135.236
Feb 16 14:42:16 * sshd[3512]: Failed password for invalid user elastic from 180.76.135.236 port 33094 ssh2
2020-02-17 06:02:01
31.44.176.6 attackbotsspam
Automatic report - Port Scan Attack
2020-02-17 05:57:05
194.40.240.96 attackspam
Automatic report - Banned IP Access
2020-02-17 06:10:56
106.12.6.58 attackbots
Feb 16 20:44:13 ns382633 sshd\[4657\]: Invalid user ftpuser from 106.12.6.58 port 47866
Feb 16 20:44:13 ns382633 sshd\[4657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.6.58
Feb 16 20:44:16 ns382633 sshd\[4657\]: Failed password for invalid user ftpuser from 106.12.6.58 port 47866 ssh2
Feb 16 21:07:36 ns382633 sshd\[8920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.6.58  user=root
Feb 16 21:07:37 ns382633 sshd\[8920\]: Failed password for root from 106.12.6.58 port 47476 ssh2
2020-02-17 05:54:58
114.33.81.237 attackspambots
Unauthorised access (Feb 16) SRC=114.33.81.237 LEN=40 TTL=44 ID=38706 TCP DPT=23 WINDOW=59742 SYN
2020-02-17 06:07:07
182.76.74.78 attackspam
Repeated brute force against a port
2020-02-17 05:45:29
184.58.55.235 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 05:39:23
79.101.58.46 attackbotsspam
WEB Remote Command Execution via Shell Script -1.a
2020-02-17 05:34:48
186.124.40.118 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 06:00:06
124.156.167.50 attackspambots
TCP port 1522: Scan and connection
2020-02-17 06:04:06

Recently Reported IPs

45.135.165.136 45.70.236.123 170.83.39.146 47.206.214.4
152.32.218.99 60.248.77.68 60.248.77.66 43.156.74.237
203.110.240.166 5.252.161.48 162.19.157.77 185.179.214.79
137.226.0.147 43.156.124.10 89.58.16.24 151.106.17.126
201.75.72.78 1.40.185.38 140.227.70.15 93.240.4.54