Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.36.158.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23974
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.36.158.12.			IN	A

;; AUTHORITY SECTION:
.			107	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092802 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 29 05:04:21 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 12.158.36.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.158.36.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
40.85.126.182 attack
Invalid user zcx from 40.85.126.182 port 34224
2020-02-23 06:59:04
5.89.64.166 attack
Invalid user lxd from 5.89.64.166 port 38856
2020-02-23 06:43:13
109.99.228.142 attackbots
suspicious action Sat, 22 Feb 2020 13:44:05 -0300
2020-02-23 06:45:00
152.101.194.18 attackspam
Invalid user theodora from 152.101.194.18 port 49800
2020-02-23 07:02:19
129.226.117.18 attackspambots
Invalid user tengyan from 129.226.117.18 port 32912
2020-02-23 06:42:20
165.227.185.201 attackbots
Automatic report - XMLRPC Attack
2020-02-23 06:33:48
114.67.64.75 attackspam
SMB Server BruteForce Attack
2020-02-23 07:04:12
159.65.133.217 attackspambots
Feb 22 12:17:19 plusreed sshd[1760]: Invalid user ocean from 159.65.133.217
...
2020-02-23 06:51:33
164.132.203.169 attackspambots
suspicious action Sat, 22 Feb 2020 13:44:09 -0300
2020-02-23 06:39:48
41.221.52.130 attackspam
firewall-block, port(s): 445/tcp
2020-02-23 06:36:17
176.32.230.13 attack
Automatic report - XMLRPC Attack
2020-02-23 06:59:50
197.45.155.12 attackspam
Feb 22 18:14:55 markkoudstaal sshd[21437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.45.155.12
Feb 22 18:14:57 markkoudstaal sshd[21437]: Failed password for invalid user guest1 from 197.45.155.12 port 40117 ssh2
Feb 22 18:24:04 markkoudstaal sshd[22964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.45.155.12
2020-02-23 06:49:56
177.8.244.38 attackspam
SSH brutforce
2020-02-23 06:41:23
103.91.180.227 attackspambots
Automatic report - Port Scan Attack
2020-02-23 06:50:27
123.207.149.93 attackspambots
Feb 22 08:43:25 hpm sshd\[4242\]: Invalid user www from 123.207.149.93
Feb 22 08:43:25 hpm sshd\[4242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.149.93
Feb 22 08:43:27 hpm sshd\[4242\]: Failed password for invalid user www from 123.207.149.93 port 33712 ssh2
Feb 22 08:46:23 hpm sshd\[4535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.149.93  user=root
Feb 22 08:46:25 hpm sshd\[4535\]: Failed password for root from 123.207.149.93 port 54798 ssh2
2020-02-23 06:28:04

Recently Reported IPs

110.93.14.164 25.214.34.92 110.93.14.158 110.93.14.76
110.93.14.79 25.26.6.102 41.241.204.212 25.42.50.103
160.83.199.56 25.51.16.32 25.83.31.115 25.83.89.57
25.111.150.38 25.69.66.93 177.104.50.0 25.56.106.45
25.37.39.230 25.77.51.77 25.77.66.115 25.5.199.56