Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Montréal

Region: Quebec

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
149.56.242.224 attack
Apr 11 01:04:46 server sshd\[95646\]: Invalid user ubuntu from 149.56.242.224
Apr 11 01:04:46 server sshd\[95646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.242.224
Apr 11 01:04:49 server sshd\[95646\]: Failed password for invalid user ubuntu from 149.56.242.224 port 33040 ssh2
...
2019-07-12 03:15:42
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.56.242.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.56.242.135.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025042300 1800 900 604800 86400

;; Query time: 122 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 23 19:05:00 CST 2025
;; MSG SIZE  rcvd: 107
Host info
135.242.56.149.in-addr.arpa domain name pointer ns533488.ip-149-56-242.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
135.242.56.149.in-addr.arpa	name = ns533488.ip-149-56-242.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
182.176.139.142 attackspam
(imapd) Failed IMAP login from 182.176.139.142 (PK/Pakistan/-): 1 in the last 3600 secs
2019-12-31 23:06:05
163.172.106.218 attackspam
Automatic report - Port Scan Attack
2019-12-31 23:26:36
202.91.69.156 attack
" "
2019-12-31 23:13:28
106.12.57.38 attack
Dec 31 16:33:14 vpn01 sshd[11836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.57.38
Dec 31 16:33:16 vpn01 sshd[11836]: Failed password for invalid user matt from 106.12.57.38 port 51880 ssh2
...
2019-12-31 23:40:33
193.32.163.44 attackbots
firewall-block, port(s): 43389/tcp
2019-12-31 23:32:26
51.79.60.147 attackbots
Dec 31 15:54:16 [host] sshd[8423]: Invalid user i-heart from 51.79.60.147
Dec 31 15:54:16 [host] sshd[8423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.60.147
Dec 31 15:54:18 [host] sshd[8423]: Failed password for invalid user i-heart from 51.79.60.147 port 54852 ssh2
2019-12-31 23:05:39
54.38.139.210 attackspam
$f2bV_matches
2019-12-31 23:34:18
24.127.191.38 attackspam
$f2bV_matches
2019-12-31 23:30:39
222.186.175.167 attackspambots
2019-12-31T07:17:51.265134homeassistant sshd[1965]: Failed password for root from 222.186.175.167 port 33958 ssh2
2019-12-31T15:26:15.161060homeassistant sshd[5711]: Failed none for root from 222.186.175.167 port 16084 ssh2
...
2019-12-31 23:29:25
106.12.61.64 attackspambots
Brute-force attempt banned
2019-12-31 23:22:30
41.131.119.107 attackspam
20 attempts against mh-ssh on echoip.magehost.pro
2019-12-31 23:11:06
196.52.43.84 attack
Unauthorized connection attempt detected from IP address 196.52.43.84 to port 502
2019-12-31 23:16:02
89.35.39.88 attackspam
Spam about "Massage Chair Reviews"
Submitted on:   2019/12/31 at 5:31 am
Spam reason:   Honeypot
2019-12-31 23:10:18
142.93.128.73 attack
$f2bV_matches
2019-12-31 23:26:54
198.199.100.240 attackbotsspam
Detected by ModSecurity. Request URI: /hello.php/ip-redirect/
2019-12-31 23:43:02

Recently Reported IPs

10.10.0.249 58.22.7.114 219.153.111.246 183.100.141.20
45.178.5.6 45.178.5.236 45.178.5.235 45.178.5.190
45.178.5.90 45.178.5.21 45.178.5.17 45.178.5.147
45.178.5.60 45.178.5.126 45.178.5.112 45.178.5.46
15.33.119.54 188.165.228.200 220.84.222.195 10.102.35.253