Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ashburn

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.51.80.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22450
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.51.80.244.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 08:33:48 CST 2025
;; MSG SIZE  rcvd: 106
Host info
244.80.51.149.in-addr.arpa domain name pointer undefined.hostname.localhost.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
244.80.51.149.in-addr.arpa	name = undefined.hostname.localhost.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
162.247.74.213 attackspambots
(sshd) Failed SSH login from 162.247.74.213 (US/United States/snowden.tor-exit.calyxinstitute.org): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun  8 01:21:20 ubnt-55d23 sshd[2712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.213  user=root
Jun  8 01:21:23 ubnt-55d23 sshd[2712]: Failed password for root from 162.247.74.213 port 45146 ssh2
2020-06-08 08:30:48
46.229.168.141 attack
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2020-06-08 08:36:43
123.207.60.232 attackbotsspam
(sshd) Failed SSH login from 123.207.60.232 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun  8 00:50:02 s1 sshd[3539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.60.232  user=root
Jun  8 00:50:04 s1 sshd[3539]: Failed password for root from 123.207.60.232 port 50996 ssh2
Jun  8 01:02:20 s1 sshd[3972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.60.232  user=root
Jun  8 01:02:21 s1 sshd[3972]: Failed password for root from 123.207.60.232 port 38072 ssh2
Jun  8 01:06:47 s1 sshd[4048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.60.232  user=root
2020-06-08 08:12:07
185.39.11.55 attackspambots
Jun  8 02:55:38 debian kernel: [476696.815910] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=185.39.11.55 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=26377 PROTO=TCP SPT=52827 DPT=20129 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-08 08:15:42
146.56.6.114 attackbots
08.06.2020 05:55:34 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2020-06-08 12:03:27
61.155.2.142 attackbots
$f2bV_matches
2020-06-08 08:33:32
3.23.98.161 attack
mue-0 : Trying access unauthorized files=>/images/jdownloads/screenshots/update.php()
2020-06-08 08:11:36
139.59.7.251 attack
Jun  8 00:41:52 legacy sshd[699]: Failed password for root from 139.59.7.251 port 34814 ssh2
Jun  8 00:45:42 legacy sshd[824]: Failed password for root from 139.59.7.251 port 37969 ssh2
...
2020-06-08 08:15:56
80.211.241.87 attackspambots
Jun  8 02:06:44 relay postfix/smtpd\[25377\]: warning: unknown\[80.211.241.87\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  8 02:07:58 relay postfix/smtpd\[25377\]: warning: unknown\[80.211.241.87\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  8 02:09:07 relay postfix/smtpd\[21180\]: warning: unknown\[80.211.241.87\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  8 02:10:16 relay postfix/smtpd\[6992\]: warning: unknown\[80.211.241.87\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  8 02:11:35 relay postfix/smtpd\[21168\]: warning: unknown\[80.211.241.87\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-08 08:23:53
67.207.89.207 attackspambots
Jun  8 01:09:25 vmd17057 sshd[18034]: Failed password for root from 67.207.89.207 port 33482 ssh2
...
2020-06-08 08:30:05
104.131.189.116 attackbots
2020-06-08T02:12:59.073467struts4.enskede.local sshd\[24602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.189.116  user=root
2020-06-08T02:13:01.276334struts4.enskede.local sshd\[24602\]: Failed password for root from 104.131.189.116 port 47716 ssh2
2020-06-08T02:15:56.927586struts4.enskede.local sshd\[24682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.189.116  user=root
2020-06-08T02:15:59.581727struts4.enskede.local sshd\[24682\]: Failed password for root from 104.131.189.116 port 49064 ssh2
2020-06-08T02:19:03.308978struts4.enskede.local sshd\[24776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.189.116  user=root
...
2020-06-08 08:19:38
183.215.125.141 attackbotsspam
Telnet Honeypot -> Telnet Bruteforce / Login
2020-06-08 12:02:55
18.27.197.252 attack
Jun  8 01:57:38 [Censored Hostname] sshd[29114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.27.197.252 
Jun  8 01:57:40 [Censored Hostname] sshd[29114]: Failed password for invalid user cedic from 18.27.197.252 port 42920 ssh2[...]
2020-06-08 08:13:06
104.199.251.49 attack
Jun  7 20:11:26 vestacp sshd[10807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.199.251.49  user=r.r
Jun  7 20:11:27 vestacp sshd[10807]: Failed password for r.r from 104.199.251.49 port 45962 ssh2
Jun  7 20:11:27 vestacp sshd[10807]: Received disconnect from 104.199.251.49 port 45962:11: Bye Bye [preauth]
Jun  7 20:11:27 vestacp sshd[10807]: Disconnected from authenticating user r.r 104.199.251.49 port 45962 [preauth]
Jun  7 20:35:12 vestacp sshd[11917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.199.251.49  user=r.r
Jun  7 20:35:13 vestacp sshd[11917]: Failed password for r.r from 104.199.251.49 port 45182 ssh2
Jun  7 20:35:14 vestacp sshd[11917]: Received disconnect from 104.199.251.49 port 45182:11: Bye Bye [preauth]
Jun  7 20:35:14 vestacp sshd[11917]: Disconnected from authenticating user r.r 104.199.251.49 port 45182 [preauth]
Jun  7 20:38:00 vestacp sshd[12036]: pam........
-------------------------------
2020-06-08 08:14:54
129.204.186.151 attackspambots
Jun  7 20:46:16 ws26vmsma01 sshd[231977]: Failed password for root from 129.204.186.151 port 47208 ssh2
...
2020-06-08 08:21:14

Recently Reported IPs

130.196.122.87 3.187.49.92 127.125.247.164 236.59.92.167
178.161.219.154 125.10.132.229 2.126.19.32 83.49.226.97
5.157.130.227 175.111.223.172 127.235.77.110 50.220.244.170
31.147.238.198 55.179.239.164 250.153.110.152 67.111.179.250
87.92.87.145 6.63.48.9 6.246.110.55 72.95.19.29