Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.47.219.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41078
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.47.219.142.			IN	A

;; AUTHORITY SECTION:
.			264	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011200 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 13 00:25:03 CST 2022
;; MSG SIZE  rcvd: 107
Host info
142.219.47.149.in-addr.arpa domain name pointer ip-149-47-219-142.iplocal.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.219.47.149.in-addr.arpa	name = ip-149-47-219-142.iplocal.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.75.148.151 attackbots
Invalid user od from 106.75.148.151 port 36758
2020-04-21 00:29:34
180.167.126.126 attackspam
Invalid user dt from 180.167.126.126 port 55260
2020-04-20 23:58:59
134.175.188.204 attackspam
Invalid user ph from 134.175.188.204 port 58068
2020-04-21 00:14:50
200.89.175.97 attackbots
Fail2Ban - SSH Bruteforce Attempt
2020-04-20 23:50:20
118.27.31.188 attackspam
Invalid user admin from 118.27.31.188 port 46744
2020-04-21 00:21:28
118.25.54.60 attackbotsspam
SSH login attempts.
2020-04-21 00:22:21
106.124.130.114 attackbotsspam
5x Failed Password
2020-04-21 00:29:14
183.111.206.111 attackbotsspam
Invalid user admin from 183.111.206.111 port 53716
2020-04-20 23:57:38
118.89.229.84 attackbotsspam
Invalid user ftpuser from 118.89.229.84 port 53026
2020-04-21 00:21:11
167.71.67.238 attack
"fail2ban match"
2020-04-21 00:04:11
138.97.23.190 attackspam
Apr 20 12:45:03 vps46666688 sshd[20853]: Failed password for root from 138.97.23.190 port 57260 ssh2
Apr 20 12:54:55 vps46666688 sshd[21036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.23.190
...
2020-04-21 00:14:32
109.196.55.45 attackspam
Invalid user tester from 109.196.55.45 port 43082
2020-04-21 00:28:28
197.251.192.159 attackbots
Invalid user admin from 197.251.192.159 port 44790
2020-04-20 23:51:25
197.40.202.12 attack
Invalid user admin from 197.40.202.12 port 45594
2020-04-20 23:52:23
176.36.192.193 attack
Apr 20 09:15:53 lanister sshd[10008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.36.192.193  user=root
Apr 20 09:15:55 lanister sshd[10008]: Failed password for root from 176.36.192.193 port 54288 ssh2
2020-04-21 00:02:37

Recently Reported IPs

250.230.15.170 177.214.237.217 15.57.222.211 150.81.249.199
51.237.57.61 93.101.82.124 30.163.36.55 48.150.107.173
238.94.171.255 193.56.4.30 241.60.225.32 89.177.1.245
59.70.188.176 153.67.179.51 146.46.68.110 148.69.48.187
217.176.57.191 222.227.222.166 110.5.178.55 237.208.167.165