Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
149.56.22.52 attackspambots
2020-08-19 15:24:52 SMTP protocol synchronization error (input sent without waiting for greeting): rejected connection from H=servidor.g-8d.com [149.56.22.52] input="S"
...
2020-08-20 04:41:12
149.56.225.158 attack
Brute force attack against VPN service
2020-03-06 14:20:01
149.56.228.253 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2020-03-02 04:58:11
149.56.222.187 attackspam
Time:     Thu Dec 12 03:13:32 2019 -0300
IP:       149.56.222.187 (CA/Canada/ip187.ip-149-56-222.net)
Failures: 30 (smtpauth)
Interval: 3600 seconds
Blocked:  Permanent Block
2019-12-12 14:53:54
149.56.228.38 attackbots
fell into ViewStateTrap:oslo
2019-11-17 06:18:47
149.56.228.253 attack
firewall-block, port(s): 445/tcp
2019-10-04 18:43:12
149.56.22.122 attackspam
Sep 15 23:05:19 newdogma sshd[9218]: Invalid user D from 149.56.22.122 port 39152
Sep 15 23:05:19 newdogma sshd[9218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.22.122
Sep 15 23:05:21 newdogma sshd[9218]: Failed password for invalid user D from 149.56.22.122 port 39152 ssh2
Sep 15 23:05:21 newdogma sshd[9218]: Received disconnect from 149.56.22.122 port 39152:11: Bye Bye [preauth]
Sep 15 23:05:21 newdogma sshd[9218]: Disconnected from 149.56.22.122 port 39152 [preauth]
Sep 15 23:19:15 newdogma sshd[9283]: Invalid user appuser from 149.56.22.122 port 60674
Sep 15 23:19:15 newdogma sshd[9283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.22.122
Sep 15 23:19:17 newdogma sshd[9283]: Failed password for invalid user appuser from 149.56.22.122 port 60674 ssh2
Sep 15 23:19:17 newdogma sshd[9283]: Received disconnect from 149.56.22.122 port 60674:11: Bye Bye [preauth]
Sep 15 2........
-------------------------------
2019-09-16 20:08:16
149.56.22.122 attackbotsspam
Sep 15 16:28:07 plex sshd[24428]: Invalid user jaiken from 149.56.22.122 port 34876
2019-09-16 05:00:47
149.56.228.253 attackbots
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 23:09:43
149.56.22.216 attack
Jul 22 02:47:27 iago sshd[587]: Did not receive identification string from 149.56.22.216
Jul 22 02:49:51 iago sshd[588]: Invalid user gorge from 149.56.22.216


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=149.56.22.216
2019-07-24 00:07:22
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.56.22.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2866
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.56.22.132.			IN	A

;; AUTHORITY SECTION:
.			381	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:50:40 CST 2022
;; MSG SIZE  rcvd: 106
Host info
132.22.56.149.in-addr.arpa domain name pointer ns529620.ip-149-56-22.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.22.56.149.in-addr.arpa	name = ns529620.ip-149-56-22.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
54.37.151.239 attackspambots
2019-08-28T06:41:16.512540  sshd[5751]: Invalid user nicole from 54.37.151.239 port 44232
2019-08-28T06:41:16.524425  sshd[5751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.151.239
2019-08-28T06:41:16.512540  sshd[5751]: Invalid user nicole from 54.37.151.239 port 44232
2019-08-28T06:41:18.835993  sshd[5751]: Failed password for invalid user nicole from 54.37.151.239 port 44232 ssh2
2019-08-28T06:45:21.598479  sshd[5844]: Invalid user lucio from 54.37.151.239 port 38614
...
2019-08-28 12:45:44
49.81.39.139 attackbots
Brute force SMTP login attempts.
2019-08-28 12:53:52
24.4.128.213 attack
Aug 28 07:07:23 mail sshd\[9415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.4.128.213
Aug 28 07:07:25 mail sshd\[9415\]: Failed password for invalid user japca from 24.4.128.213 port 44794 ssh2
Aug 28 07:11:32 mail sshd\[10191\]: Invalid user com from 24.4.128.213 port 33514
Aug 28 07:11:32 mail sshd\[10191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.4.128.213
Aug 28 07:11:33 mail sshd\[10191\]: Failed password for invalid user com from 24.4.128.213 port 33514 ssh2
2019-08-28 13:17:29
94.23.207.142 attackspambots
Aug 28 06:44:57 SilenceServices sshd[12997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.207.142
Aug 28 06:44:59 SilenceServices sshd[12997]: Failed password for invalid user kmathieu from 94.23.207.142 port 60096 ssh2
Aug 28 06:48:41 SilenceServices sshd[14401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.207.142
2019-08-28 12:54:40
193.201.224.214 attackbotsspam
Aug 28 04:27:56 core sshd\[22842\]: Invalid user 0 from 193.201.224.214
Aug 28 04:29:29 core sshd\[22846\]: Invalid user 22 from 193.201.224.214
Aug 28 04:32:09 core sshd\[22852\]: Invalid user 101 from 193.201.224.214
Aug 28 04:33:00 core sshd\[22855\]: Invalid user 123 from 193.201.224.214
Aug 28 04:33:20 core sshd\[22858\]: Invalid user 1111 from 193.201.224.214
...
2019-08-28 13:04:45
150.242.213.189 attackspambots
Aug 28 06:50:53 mail sshd\[6661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.242.213.189
Aug 28 06:50:55 mail sshd\[6661\]: Failed password for invalid user internat123 from 150.242.213.189 port 55772 ssh2
Aug 28 06:55:17 mail sshd\[7212\]: Invalid user postgres from 150.242.213.189 port 45638
Aug 28 06:55:17 mail sshd\[7212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.242.213.189
Aug 28 06:55:19 mail sshd\[7212\]: Failed password for invalid user postgres from 150.242.213.189 port 45638 ssh2
2019-08-28 13:05:29
200.42.179.138 attackbotsspam
Aug 27 19:21:00 sachi sshd\[13598\]: Invalid user barbara from 200.42.179.138
Aug 27 19:21:00 sachi sshd\[13598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200-42-179-138.static.tie.cl
Aug 27 19:21:02 sachi sshd\[13598\]: Failed password for invalid user barbara from 200.42.179.138 port 46934 ssh2
Aug 27 19:25:55 sachi sshd\[14020\]: Invalid user ts1 from 200.42.179.138
Aug 27 19:25:55 sachi sshd\[14020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200-42-179-138.static.tie.cl
2019-08-28 13:46:57
82.119.100.182 attackspam
Aug 28 05:11:32 localhost sshd\[53480\]: Invalid user minecraft from 82.119.100.182 port 19969
Aug 28 05:11:32 localhost sshd\[53480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.119.100.182
Aug 28 05:11:33 localhost sshd\[53480\]: Failed password for invalid user minecraft from 82.119.100.182 port 19969 ssh2
Aug 28 05:16:10 localhost sshd\[53597\]: Invalid user sinusbot from 82.119.100.182 port 19393
Aug 28 05:16:10 localhost sshd\[53597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.119.100.182
...
2019-08-28 13:18:14
78.176.165.192 attackspambots
port scan and connect, tcp 23 (telnet)
2019-08-28 12:59:22
94.176.5.253 attack
(Aug 28)  LEN=44 TTL=244 ID=54579 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 28)  LEN=44 TTL=244 ID=45531 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 28)  LEN=44 TTL=244 ID=17942 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 28)  LEN=44 TTL=244 ID=13535 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 28)  LEN=44 TTL=244 ID=6748 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 27)  LEN=44 TTL=244 ID=37986 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 27)  LEN=44 TTL=244 ID=53030 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 27)  LEN=44 TTL=244 ID=34415 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 27)  LEN=44 TTL=244 ID=60881 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 27)  LEN=44 TTL=244 ID=62188 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 27)  LEN=44 TTL=244 ID=61565 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 27)  LEN=44 TTL=244 ID=24872 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 27)  LEN=44 TTL=244 ID=36510 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 27)  LEN=44 TTL=244 ID=46496 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 27)  LEN=44 TTL=244 ID=25037 DF TCP DPT=23 WINDOW=14600 S...
2019-08-28 13:29:31
109.94.121.243 attackspambots
Telnet Server BruteForce Attack
2019-08-28 13:22:47
49.245.40.40 attackbots
namecheap spam
2019-08-28 13:24:17
200.160.106.241 attackbotsspam
2019-08-28T04:23:32.535937hub.schaetter.us sshd\[32728\]: Invalid user sicher from 200.160.106.241
2019-08-28T04:23:32.592905hub.schaetter.us sshd\[32728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.160.106.241
2019-08-28T04:23:34.498758hub.schaetter.us sshd\[32728\]: Failed password for invalid user sicher from 200.160.106.241 port 49671 ssh2
2019-08-28T04:29:11.042235hub.schaetter.us sshd\[32753\]: Invalid user shell from 200.160.106.241
2019-08-28T04:29:11.087275hub.schaetter.us sshd\[32753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.160.106.241
...
2019-08-28 13:17:50
80.211.242.211 attack
Aug 27 19:12:12 web1 sshd\[15075\]: Invalid user admin from 80.211.242.211
Aug 27 19:12:12 web1 sshd\[15075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.242.211
Aug 27 19:12:14 web1 sshd\[15075\]: Failed password for invalid user admin from 80.211.242.211 port 52286 ssh2
Aug 27 19:16:20 web1 sshd\[15635\]: Invalid user ubuntu from 80.211.242.211
Aug 27 19:16:20 web1 sshd\[15635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.242.211
2019-08-28 13:47:21
150.95.83.147 attackbots
2019-08-28T05:02:02.955149abusebot-7.cloudsearch.cf sshd\[15573\]: Invalid user buyer from 150.95.83.147 port 45370
2019-08-28 13:06:09

Recently Reported IPs

149.56.221.90 149.56.226.4 149.56.229.83 149.56.23.32
149.56.228.144 149.56.201.253 149.56.23.157 149.56.25.46
149.56.241.46 149.56.245.136 149.56.255.113 149.56.232.131
149.56.25.74 149.56.222.144 149.56.26.130 149.56.24.165
149.56.26.29 149.56.245.48 149.56.243.10 149.56.26.144