Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
149.56.22.52 attackspambots
2020-08-19 15:24:52 SMTP protocol synchronization error (input sent without waiting for greeting): rejected connection from H=servidor.g-8d.com [149.56.22.52] input="S"
...
2020-08-20 04:41:12
149.56.225.158 attack
Brute force attack against VPN service
2020-03-06 14:20:01
149.56.228.253 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2020-03-02 04:58:11
149.56.222.187 attackspam
Time:     Thu Dec 12 03:13:32 2019 -0300
IP:       149.56.222.187 (CA/Canada/ip187.ip-149-56-222.net)
Failures: 30 (smtpauth)
Interval: 3600 seconds
Blocked:  Permanent Block
2019-12-12 14:53:54
149.56.228.38 attackbots
fell into ViewStateTrap:oslo
2019-11-17 06:18:47
149.56.228.253 attack
firewall-block, port(s): 445/tcp
2019-10-04 18:43:12
149.56.22.122 attackspam
Sep 15 23:05:19 newdogma sshd[9218]: Invalid user D from 149.56.22.122 port 39152
Sep 15 23:05:19 newdogma sshd[9218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.22.122
Sep 15 23:05:21 newdogma sshd[9218]: Failed password for invalid user D from 149.56.22.122 port 39152 ssh2
Sep 15 23:05:21 newdogma sshd[9218]: Received disconnect from 149.56.22.122 port 39152:11: Bye Bye [preauth]
Sep 15 23:05:21 newdogma sshd[9218]: Disconnected from 149.56.22.122 port 39152 [preauth]
Sep 15 23:19:15 newdogma sshd[9283]: Invalid user appuser from 149.56.22.122 port 60674
Sep 15 23:19:15 newdogma sshd[9283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.22.122
Sep 15 23:19:17 newdogma sshd[9283]: Failed password for invalid user appuser from 149.56.22.122 port 60674 ssh2
Sep 15 23:19:17 newdogma sshd[9283]: Received disconnect from 149.56.22.122 port 60674:11: Bye Bye [preauth]
Sep 15 2........
-------------------------------
2019-09-16 20:08:16
149.56.22.122 attackbotsspam
Sep 15 16:28:07 plex sshd[24428]: Invalid user jaiken from 149.56.22.122 port 34876
2019-09-16 05:00:47
149.56.228.253 attackbots
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 23:09:43
149.56.22.216 attack
Jul 22 02:47:27 iago sshd[587]: Did not receive identification string from 149.56.22.216
Jul 22 02:49:51 iago sshd[588]: Invalid user gorge from 149.56.22.216


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=149.56.22.216
2019-07-24 00:07:22
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.56.22.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44658
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.56.22.199.			IN	A

;; AUTHORITY SECTION:
.			382	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:50:39 CST 2022
;; MSG SIZE  rcvd: 106
Host info
199.22.56.149.in-addr.arpa domain name pointer ns529663.ip-149-56-22.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
199.22.56.149.in-addr.arpa	name = ns529663.ip-149-56-22.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
200.71.71.98 attackbotsspam
Invalid user admin from 200.71.71.98 port 44797
2020-04-21 20:17:30
192.99.57.32 attackbotsspam
Invalid user postgres from 192.99.57.32 port 53586
2020-04-21 20:19:23
111.229.133.198 attack
SSH/22 MH Probe, BF, Hack -
2020-04-21 19:54:31
163.44.153.96 attackspam
2020-04-21T04:41:10.3261521495-001 sshd[10323]: Invalid user ubuntu from 163.44.153.96 port 3339
2020-04-21T04:41:12.3582711495-001 sshd[10323]: Failed password for invalid user ubuntu from 163.44.153.96 port 3339 ssh2
2020-04-21T04:44:25.8475671495-001 sshd[10508]: Invalid user ex from 163.44.153.96 port 57285
2020-04-21T04:44:25.8583161495-001 sshd[10508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=v163-44-153-96.a00e.g.sin1.static.cnode.io
2020-04-21T04:44:25.8475671495-001 sshd[10508]: Invalid user ex from 163.44.153.96 port 57285
2020-04-21T04:44:28.3197381495-001 sshd[10508]: Failed password for invalid user ex from 163.44.153.96 port 57285 ssh2
...
2020-04-21 19:47:10
188.173.80.134 attackspambots
(sshd) Failed SSH login from 188.173.80.134 (RO/Romania/188-173-80-134.next-gen.ro): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 21 11:35:52 ubnt-55d23 sshd[24643]: Invalid user zl from 188.173.80.134 port 48819
Apr 21 11:35:54 ubnt-55d23 sshd[24643]: Failed password for invalid user zl from 188.173.80.134 port 48819 ssh2
2020-04-21 19:46:12
190.0.30.90 attack
Invalid user admin from 190.0.30.90 port 37912
2020-04-21 20:21:11
113.190.37.142 attackbotsspam
Invalid user spark from 113.190.37.142 port 17417
2020-04-21 20:06:52
68.183.75.36 attack
68.183.75.36 - - [21/Apr/2020:09:49:52 +0200] "GET /wp-login.php HTTP/1.1" 200 5805 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.75.36 - - [21/Apr/2020:09:49:55 +0200] "POST /wp-login.php HTTP/1.1" 200 5997 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.75.36 - - [21/Apr/2020:09:49:56 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-21 20:00:43
118.24.36.247 attack
Invalid user admin from 118.24.36.247 port 40808
2020-04-21 20:05:57
120.37.91.8 attack
Port probing on unauthorized port 1433
2020-04-21 19:58:24
213.55.77.131 attackspambots
Invalid user test from 213.55.77.131 port 43100
2020-04-21 20:14:59
186.146.1.122 attackspambots
Invalid user testing from 186.146.1.122 port 54558
2020-04-21 20:22:51
104.211.158.29 attack
Invalid user admin from 104.211.158.29 port 60236
2020-04-21 20:07:52
36.67.106.109 attackspam
Invalid user sw from 36.67.106.109 port 44685
2020-04-21 20:13:41
113.210.150.107 attack
Invalid user minecraft from 113.210.150.107 port 45534
2020-04-21 20:06:24

Recently Reported IPs

149.56.200.93 149.56.200.81 10.198.7.8 149.56.200.84
149.56.204.150 149.56.221.90 149.56.22.132 149.56.226.4
149.56.229.83 149.56.23.32 149.56.228.144 149.56.201.253
149.56.23.157 149.56.25.46 149.56.241.46 149.56.245.136
149.56.255.113 149.56.232.131 149.56.25.74 149.56.222.144