Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Barcelona

Region: Catalonia

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: Adamo Telecom Iberia S.A.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
149.34.3.110 attack
Unauthorized access to SSH at 21/Sep/2020:17:00:33 +0000.
2020-09-23 02:15:39
149.34.3.110 attackbots
Unauthorized access to SSH at 21/Sep/2020:17:00:33 +0000.
2020-09-22 18:18:31
149.34.37.46 attack
Honeypot attack, port: 5555, PTR: PTR record not found
2020-04-01 02:36:23
149.34.3.73 attack
Unauthorized connection attempt detected from IP address 149.34.3.73 to port 5555 [J]
2020-01-05 03:46:12
149.34.37.8 attackbotsspam
Unauthorized connection attempt detected from IP address 149.34.37.8 to port 23 [J]
2020-01-05 01:36:20
149.34.34.195 attackspam
Automatic report - Port Scan Attack
2019-11-25 22:31:33
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.34.3.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36916
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;149.34.3.205.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jun 03 20:13:21 CST 2019
;; MSG SIZE  rcvd: 116

Host info
205.3.34.149.in-addr.arpa domain name pointer cli-952203cd.wholesale.adamo.es.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
205.3.34.149.in-addr.arpa	name = cli-952203cd.wholesale.adamo.es.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
67.219.145.12 attackspambots
SpamScore above: 10.0
2020-04-04 06:09:29
142.93.127.16 attack
Invalid user cacti from 142.93.127.16 port 38784
2020-04-04 05:39:52
122.228.19.80 attackspambots
122.228.19.80 was recorded 18 times by 7 hosts attempting to connect to the following ports: 264,33338,9443,88,4343,10134,28015,1010,6488,9200,9002,623,10000,5357,3283,25565,8090,7170. Incident counter (4h, 24h, all-time): 18, 118, 29564
2020-04-04 06:11:41
157.245.12.36 attackbotsspam
Fail2Ban Ban Triggered
2020-04-04 06:06:35
139.59.108.237 attackspambots
2020-04-03T20:44:45.976924abusebot-8.cloudsearch.cf sshd[11448]: Invalid user zll from 139.59.108.237 port 56906
2020-04-03T20:44:45.985787abusebot-8.cloudsearch.cf sshd[11448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.108.237
2020-04-03T20:44:45.976924abusebot-8.cloudsearch.cf sshd[11448]: Invalid user zll from 139.59.108.237 port 56906
2020-04-03T20:44:47.923662abusebot-8.cloudsearch.cf sshd[11448]: Failed password for invalid user zll from 139.59.108.237 port 56906 ssh2
2020-04-03T20:50:22.027796abusebot-8.cloudsearch.cf sshd[11835]: Invalid user ea from 139.59.108.237 port 40156
2020-04-03T20:50:22.034870abusebot-8.cloudsearch.cf sshd[11835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.108.237
2020-04-03T20:50:22.027796abusebot-8.cloudsearch.cf sshd[11835]: Invalid user ea from 139.59.108.237 port 40156
2020-04-03T20:50:24.238421abusebot-8.cloudsearch.cf sshd[11835]: Failed pass
...
2020-04-04 05:41:19
128.199.166.224 attack
2020-04-03T23:34:22.413096vps773228.ovh.net sshd[8604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.166.224  user=root
2020-04-03T23:34:24.707197vps773228.ovh.net sshd[8604]: Failed password for root from 128.199.166.224 port 54991 ssh2
2020-04-03T23:38:14.045947vps773228.ovh.net sshd[10067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.166.224  user=root
2020-04-03T23:38:15.857986vps773228.ovh.net sshd[10067]: Failed password for root from 128.199.166.224 port 54802 ssh2
2020-04-03T23:41:46.317789vps773228.ovh.net sshd[11434]: Invalid user hl from 128.199.166.224 port 54627
...
2020-04-04 06:02:46
185.153.196.230 attackbotsspam
Apr  3 23:41:51 srv2 sshd\[15677\]: Invalid user 0 from 185.153.196.230 port 33320
Apr  3 23:41:53 srv2 sshd\[15679\]: Invalid user 22 from 185.153.196.230 port 56283
Apr  3 23:42:00 srv2 sshd\[15683\]: Invalid user 101 from 185.153.196.230 port 50414
2020-04-04 05:46:49
149.7.217.27 attackspam
Invalid user xm from 149.7.217.27 port 54458
2020-04-04 05:38:23
159.65.41.159 attackbots
SSH Invalid Login
2020-04-04 05:53:42
128.199.242.84 attackbotsspam
Invalid user zabbix from 128.199.242.84 port 48158
2020-04-04 05:42:40
124.172.188.122 attackbots
Apr  3 16:45:29 DAAP sshd[26120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.172.188.122  user=root
Apr  3 16:45:30 DAAP sshd[26120]: Failed password for root from 124.172.188.122 port 49228 ssh2
Apr  3 16:48:31 DAAP sshd[26164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.172.188.122  user=root
Apr  3 16:48:33 DAAP sshd[26164]: Failed password for root from 124.172.188.122 port 62724 ssh2
Apr  3 16:51:34 DAAP sshd[26231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.172.188.122  user=root
Apr  3 16:51:35 DAAP sshd[26231]: Failed password for root from 124.172.188.122 port 16227 ssh2
...
2020-04-04 05:44:20
77.82.90.234 attackbots
Apr  3 23:38:16 prox sshd[25338]: Failed password for root from 77.82.90.234 port 38420 ssh2
2020-04-04 06:01:15
106.12.33.39 attack
2020-04-03T21:35:28.364797dmca.cloudsearch.cf sshd[29400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.33.39  user=root
2020-04-03T21:35:30.387558dmca.cloudsearch.cf sshd[29400]: Failed password for root from 106.12.33.39 port 35544 ssh2
2020-04-03T21:40:00.425252dmca.cloudsearch.cf sshd[29760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.33.39  user=root
2020-04-03T21:40:02.457623dmca.cloudsearch.cf sshd[29760]: Failed password for root from 106.12.33.39 port 58488 ssh2
2020-04-03T21:42:52.354297dmca.cloudsearch.cf sshd[30011]: Invalid user vmadmin from 106.12.33.39 port 36904
2020-04-03T21:42:52.359703dmca.cloudsearch.cf sshd[30011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.33.39
2020-04-03T21:42:52.354297dmca.cloudsearch.cf sshd[30011]: Invalid user vmadmin from 106.12.33.39 port 36904
2020-04-03T21:42:54.005488dmca.cloudsearch.c
...
2020-04-04 06:12:05
222.186.175.151 attackspambots
$f2bV_matches
2020-04-04 05:57:10
151.80.41.64 attackbots
(sshd) Failed SSH login from 151.80.41.64 (FR/France/ns398062.ip-151-80-41.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  3 21:55:02 srv sshd[22177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.41.64  user=root
Apr  3 21:55:04 srv sshd[22177]: Failed password for root from 151.80.41.64 port 39393 ssh2
Apr  3 22:12:13 srv sshd[22719]: Invalid user xbot from 151.80.41.64 port 50342
Apr  3 22:12:15 srv sshd[22719]: Failed password for invalid user xbot from 151.80.41.64 port 50342 ssh2
Apr  3 22:15:55 srv sshd[22990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.41.64  user=root
2020-04-04 05:38:02

Recently Reported IPs

146.221.187.112 176.88.145.123 117.102.88.119 120.101.199.195
214.18.15.18 218.62.81.94 85.77.131.204 50.169.207.192
42.241.126.14 110.240.100.148 157.78.109.164 27.44.251.50
80.78.230.89 195.124.185.126 32.106.119.121 97.212.86.162
81.39.78.238 167.248.16.251 35.196.158.126 99.42.50.118