Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.57.12.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46893
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.57.12.86.			IN	A

;; AUTHORITY SECTION:
.			188	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091500 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 15 17:54:32 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 86.12.57.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 86.12.57.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
79.137.125.49 attack
Aug 31 16:38:14 intra sshd\[59137\]: Invalid user test from 79.137.125.49Aug 31 16:38:16 intra sshd\[59137\]: Failed password for invalid user test from 79.137.125.49 port 54756 ssh2Aug 31 16:42:54 intra sshd\[59204\]: Invalid user admin from 79.137.125.49Aug 31 16:42:56 intra sshd\[59204\]: Failed password for invalid user admin from 79.137.125.49 port 42442 ssh2Aug 31 16:47:21 intra sshd\[59272\]: Invalid user git from 79.137.125.49Aug 31 16:47:23 intra sshd\[59272\]: Failed password for invalid user git from 79.137.125.49 port 58364 ssh2
...
2019-08-31 21:59:54
138.68.128.80 attackbots
Aug 31 15:16:59 plex sshd[16973]: Invalid user dattesh from 138.68.128.80 port 34686
2019-08-31 21:20:11
92.118.37.97 attack
firewall-block, port(s): 3999/tcp, 4004/tcp, 4999/tcp, 6666/tcp, 6789/tcp, 7775/tcp, 9004/tcp, 9997/tcp, 13390/tcp, 33889/tcp, 33891/tcp, 38308/tcp, 43391/tcp, 47046/tcp, 47048/tcp, 47393/tcp, 63333/tcp, 64734/tcp
2019-08-31 21:20:50
120.195.162.71 attackspambots
Aug 31 09:52:42 ny01 sshd[967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.195.162.71
Aug 31 09:52:44 ny01 sshd[967]: Failed password for invalid user uuuuu from 120.195.162.71 port 44080 ssh2
Aug 31 09:56:16 ny01 sshd[1975]: Failed password for root from 120.195.162.71 port 37476 ssh2
2019-08-31 21:56:19
45.55.231.94 attackbots
Aug 31 15:43:56 legacy sshd[28857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.231.94
Aug 31 15:43:58 legacy sshd[28857]: Failed password for invalid user abhijith from 45.55.231.94 port 43022 ssh2
Aug 31 15:48:01 legacy sshd[29044]: Failed password for root from 45.55.231.94 port 59742 ssh2
...
2019-08-31 22:04:44
82.202.204.77 attack
Aug 31 09:10:32 vps200512 sshd\[22388\]: Invalid user marias from 82.202.204.77
Aug 31 09:10:33 vps200512 sshd\[22388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.202.204.77
Aug 31 09:10:35 vps200512 sshd\[22388\]: Failed password for invalid user marias from 82.202.204.77 port 60334 ssh2
Aug 31 09:14:36 vps200512 sshd\[22452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.202.204.77  user=root
Aug 31 09:14:38 vps200512 sshd\[22452\]: Failed password for root from 82.202.204.77 port 47166 ssh2
2019-08-31 21:22:45
94.102.51.78 attackbots
Aug 31 13:40:01 rotator sshd\[12166\]: Failed password for root from 94.102.51.78 port 38020 ssh2Aug 31 13:40:07 rotator sshd\[12166\]: Failed password for root from 94.102.51.78 port 38020 ssh2Aug 31 13:40:12 rotator sshd\[12166\]: Failed password for root from 94.102.51.78 port 38020 ssh2Aug 31 13:40:17 rotator sshd\[12166\]: Failed password for root from 94.102.51.78 port 38020 ssh2Aug 31 13:40:24 rotator sshd\[12166\]: Failed password for root from 94.102.51.78 port 38020 ssh2Aug 31 13:40:28 rotator sshd\[12166\]: Failed password for root from 94.102.51.78 port 38020 ssh2
...
2019-08-31 21:43:07
190.210.42.83 attackbots
$f2bV_matches
2019-08-31 21:44:56
223.25.99.34 attackspam
WordPress wp-login brute force :: 223.25.99.34 0.128 BYPASS [31/Aug/2019:23:16:44  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-31 21:37:19
185.209.0.84 attackspambots
Port scan on 4 port(s): 7028 7029 7031 7034
2019-08-31 21:31:46
223.25.101.76 attackspam
Invalid user augusta from 223.25.101.76 port 39934
2019-08-31 21:27:49
45.73.12.218 attackspambots
Aug 31 11:53:15 game-panel sshd[6670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.73.12.218
Aug 31 11:53:17 game-panel sshd[6670]: Failed password for invalid user order from 45.73.12.218 port 36800 ssh2
Aug 31 11:57:50 game-panel sshd[6799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.73.12.218
2019-08-31 21:51:50
209.141.55.210 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-31 21:16:41
198.108.67.100 attackspam
08/31/2019-07:40:31.713652 198.108.67.100 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-08-31 21:44:36
181.30.27.11 attackspam
Aug 31 03:33:58 tdfoods sshd\[27066\]: Invalid user leica from 181.30.27.11
Aug 31 03:33:58 tdfoods sshd\[27066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.27.11
Aug 31 03:34:01 tdfoods sshd\[27066\]: Failed password for invalid user leica from 181.30.27.11 port 40476 ssh2
Aug 31 03:39:50 tdfoods sshd\[27730\]: Invalid user teamspeak from 181.30.27.11
Aug 31 03:39:50 tdfoods sshd\[27730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.27.11
2019-08-31 22:01:27

Recently Reported IPs

69.196.152.139 65.227.254.213 45.230.167.36 65.19.138.98
104.144.159.203 104.144.103.20 104.144.183.185 45.138.100.235
93.177.116.109 46.21.146.87 154.202.100.106 154.201.33.128
91.188.247.206 192.3.208.86 45.134.184.203 185.242.95.42
156.238.9.98 5.157.131.180 45.192.134.71 178.62.88.180