Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
149.56.22.52 attackspambots
2020-08-19 15:24:52 SMTP protocol synchronization error (input sent without waiting for greeting): rejected connection from H=servidor.g-8d.com [149.56.22.52] input="S"
...
2020-08-20 04:41:12
149.56.225.158 attack
Brute force attack against VPN service
2020-03-06 14:20:01
149.56.228.253 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2020-03-02 04:58:11
149.56.222.187 attackspam
Time:     Thu Dec 12 03:13:32 2019 -0300
IP:       149.56.222.187 (CA/Canada/ip187.ip-149-56-222.net)
Failures: 30 (smtpauth)
Interval: 3600 seconds
Blocked:  Permanent Block
2019-12-12 14:53:54
149.56.228.38 attackbots
fell into ViewStateTrap:oslo
2019-11-17 06:18:47
149.56.228.253 attack
firewall-block, port(s): 445/tcp
2019-10-04 18:43:12
149.56.22.122 attackspam
Sep 15 23:05:19 newdogma sshd[9218]: Invalid user D from 149.56.22.122 port 39152
Sep 15 23:05:19 newdogma sshd[9218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.22.122
Sep 15 23:05:21 newdogma sshd[9218]: Failed password for invalid user D from 149.56.22.122 port 39152 ssh2
Sep 15 23:05:21 newdogma sshd[9218]: Received disconnect from 149.56.22.122 port 39152:11: Bye Bye [preauth]
Sep 15 23:05:21 newdogma sshd[9218]: Disconnected from 149.56.22.122 port 39152 [preauth]
Sep 15 23:19:15 newdogma sshd[9283]: Invalid user appuser from 149.56.22.122 port 60674
Sep 15 23:19:15 newdogma sshd[9283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.22.122
Sep 15 23:19:17 newdogma sshd[9283]: Failed password for invalid user appuser from 149.56.22.122 port 60674 ssh2
Sep 15 23:19:17 newdogma sshd[9283]: Received disconnect from 149.56.22.122 port 60674:11: Bye Bye [preauth]
Sep 15 2........
-------------------------------
2019-09-16 20:08:16
149.56.22.122 attackbotsspam
Sep 15 16:28:07 plex sshd[24428]: Invalid user jaiken from 149.56.22.122 port 34876
2019-09-16 05:00:47
149.56.228.253 attackbots
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 23:09:43
149.56.22.216 attack
Jul 22 02:47:27 iago sshd[587]: Did not receive identification string from 149.56.22.216
Jul 22 02:49:51 iago sshd[588]: Invalid user gorge from 149.56.22.216


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=149.56.22.216
2019-07-24 00:07:22
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.56.22.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44658
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.56.22.199.			IN	A

;; AUTHORITY SECTION:
.			382	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:50:39 CST 2022
;; MSG SIZE  rcvd: 106
Host info
199.22.56.149.in-addr.arpa domain name pointer ns529663.ip-149-56-22.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
199.22.56.149.in-addr.arpa	name = ns529663.ip-149-56-22.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
203.154.78.176 attack
445/tcp 445/tcp 445/tcp...
[2019-06-06/08-04]17pkt,1pt.(tcp)
2019-08-05 03:57:41
182.176.169.97 attackspambots
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08041230)
2019-08-05 03:33:51
165.22.36.110 attackspambots
[portscan] tcp/22 [SSH]
[scan/connect: 2 time(s)]
*(RWIN=65535)(08041230)
2019-08-05 03:39:12
61.7.253.197 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08041230)
2019-08-05 03:48:38
124.6.187.118 attackspam
08/04/2019-08:33:26.474725 124.6.187.118 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-05 04:08:31
58.187.137.221 attack
[portscan] tcp/23 [TELNET]
*(RWIN=27532)(08041230)
2019-08-05 04:20:41
23.95.82.154 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08041230)
2019-08-05 03:53:18
162.243.147.46 attackbotsspam
34422/tcp 27017/tcp 389/tcp...
[2019-06-28/08-04]56pkt,47pt.(tcp),2pt.(udp)
2019-08-05 04:05:29
201.167.5.150 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(08041230)
2019-08-05 03:58:44
121.234.80.120 attackspambots
[portscan] tcp/23 [TELNET]
*(RWIN=16958)(08041230)
2019-08-05 04:09:20
122.191.198.250 attackbotsspam
[portscan] tcp/22 [SSH]
*(RWIN=2112)(08041230)
2019-08-05 03:40:29
167.71.199.63 attackspambots
[portscan] tcp/23 [TELNET]
[scan/connect: 17 time(s)]
*(RWIN=1454)(08041230)
2019-08-05 03:38:42
79.158.115.38 attack
[portscan] tcp/23 [TELNET]
*(RWIN=21005)(08041230)
2019-08-05 03:45:42
177.19.55.217 attackspambots
[portscan] tcp/23 [TELNET]
*(RWIN=63227)(08041230)
2019-08-05 03:35:58
172.116.233.91 attackbotsspam
[portscan] tcp/23 [TELNET]
*(RWIN=41961)(08041230)
2019-08-05 03:37:40

Recently Reported IPs

149.56.200.93 149.56.200.81 10.198.7.8 149.56.200.84
149.56.204.150 149.56.221.90 149.56.22.132 149.56.226.4
149.56.229.83 149.56.23.32 149.56.228.144 149.56.201.253
149.56.23.157 149.56.25.46 149.56.241.46 149.56.245.136
149.56.255.113 149.56.232.131 149.56.25.74 149.56.222.144