Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hessen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.34.249.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60772
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.34.249.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011501 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 16 06:35:06 CST 2025
;; MSG SIZE  rcvd: 106
Host info
14.249.34.149.in-addr.arpa domain name pointer unn-149-34-249-14.datapacket.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.249.34.149.in-addr.arpa	name = unn-149-34-249-14.datapacket.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
23.94.187.130 attackspam
23.94.187.130 - - \[14/Nov/2019:13:09:50 +0100\] "POST /wp-login.php HTTP/1.0" 200 4128 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
23.94.187.130 - - \[14/Nov/2019:13:09:51 +0100\] "POST /wp-login.php HTTP/1.0" 200 3955 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
23.94.187.130 - - \[14/Nov/2019:13:09:52 +0100\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-14 22:24:50
27.100.26.165 attackspambots
...
2019-11-14 23:06:17
27.70.153.187 attackbotsspam
Nov 14 15:40:29 cvbnet sshd[8655]: Failed password for root from 27.70.153.187 port 38340 ssh2
...
2019-11-14 22:53:47
27.155.99.173 attack
Invalid user zimbra from 27.155.99.173 port 47435
2019-11-14 22:39:41
113.11.254.216 attackbots
Automatic report - XMLRPC Attack
2019-11-14 22:53:33
160.153.147.135 attackbots
Automatic report - XMLRPC Attack
2019-11-14 22:44:26
199.192.29.164 attack
Automatic report - XMLRPC Attack
2019-11-14 22:49:47
149.129.233.149 attackspambots
Nov 14 04:37:21 php1 sshd\[31347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.233.149  user=root
Nov 14 04:37:24 php1 sshd\[31347\]: Failed password for root from 149.129.233.149 port 47794 ssh2
Nov 14 04:41:45 php1 sshd\[31774\]: Invalid user acehire from 149.129.233.149
Nov 14 04:41:45 php1 sshd\[31774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.233.149
Nov 14 04:41:48 php1 sshd\[31774\]: Failed password for invalid user acehire from 149.129.233.149 port 48016 ssh2
2019-11-14 22:51:19
217.217.134.224 attack
[Aegis] @ 2019-11-14 06:18:53  0000 -> Sendmail rejected message.
2019-11-14 22:38:01
41.32.211.177 attack
Automatic report - Port Scan Attack
2019-11-14 22:52:42
93.113.125.89 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-14 22:25:16
185.175.93.105 attack
Portscan or hack attempt detected by psad/fwsnort
2019-11-14 22:32:45
222.186.175.202 attackbotsspam
Nov 14 15:46:15 MK-Soft-VM5 sshd[14624]: Failed password for root from 222.186.175.202 port 24800 ssh2
Nov 14 15:46:21 MK-Soft-VM5 sshd[14624]: Failed password for root from 222.186.175.202 port 24800 ssh2
...
2019-11-14 22:51:53
85.128.142.94 attackspambots
Automatic report - XMLRPC Attack
2019-11-14 23:03:29
92.118.37.95 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-11-14 23:08:19

Recently Reported IPs

213.142.96.117 76.117.171.60 246.78.51.85 30.85.137.18
73.7.18.49 9.46.221.201 55.12.120.86 4.149.251.46
125.225.38.138 48.120.102.51 188.108.211.23 192.167.39.131
47.190.69.125 78.71.58.13 88.210.91.161 65.78.11.144
250.224.226.127 77.245.156.163 228.82.88.240 231.135.230.86