Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.59.64.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50545
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.59.64.34.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011700 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 18 01:36:49 CST 2025
;; MSG SIZE  rcvd: 105
Host info
b'Host 34.64.59.149.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 149.59.64.34.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
54.215.254.182 attackspambots
Jun 17 16:06:05 xb3 sshd[21096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-54-215-254-182.us-west-1.compute.amazonaws.com
Jun 17 16:06:07 xb3 sshd[21096]: Failed password for invalid user redhat from 54.215.254.182 port 37536 ssh2
Jun 17 16:06:07 xb3 sshd[21096]: Received disconnect from 54.215.254.182: 11: Bye Bye [preauth]
Jun 17 16:09:34 xb3 sshd[30670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-54-215-254-182.us-west-1.compute.amazonaws.com
Jun 17 16:09:35 xb3 sshd[30670]: Failed password for invalid user natassja from 54.215.254.182 port 53018 ssh2
Jun 17 16:09:36 xb3 sshd[30670]: Received disconnect from 54.215.254.182: 11: Bye Bye [preauth]
Jun 17 16:11:26 xb3 sshd[23535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-54-215-254-182.us-west-1.compute.amazonaws.com
Jun 17 16:11:28 xb3 sshd[23535]: Failed password for inv........
-------------------------------
2019-06-21 23:33:52
61.134.133.159 attack
5500/tcp
[2019-06-21]1pkt
2019-06-21 23:31:11
117.70.224.148 attackbots
Jun 20 16:37:09 econome sshd[3322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.70.224.148  user=r.r
Jun 20 16:37:11 econome sshd[3322]: Failed password for r.r from 117.70.224.148 port 58751 ssh2
Jun 20 16:37:13 econome sshd[3322]: Failed password for r.r from 117.70.224.148 port 58751 ssh2
Jun 20 16:37:15 econome sshd[3322]: Failed password for r.r from 117.70.224.148 port 58751 ssh2
Jun 20 16:37:18 econome sshd[3322]: Failed password for r.r from 117.70.224.148 port 58751 ssh2
Jun 20 16:37:20 econome sshd[3322]: Failed password for r.r from 117.70.224.148 port 58751 ssh2
Jun 20 16:37:22 econome sshd[3322]: Failed password for r.r from 117.70.224.148 port 58751 ssh2
Jun 20 16:37:22 econome sshd[3322]: Disconnecting: Too many authentication failures for r.r from 117.70.224.148 port 58751 ssh2 [preauth]
Jun 20 16:37:22 econome sshd[3322]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.70........
-------------------------------
2019-06-22 00:32:21
90.143.46.14 attackbotsspam
Wordpress attack
2019-06-21 23:14:40
85.93.59.80 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-22 00:10:15
60.189.63.168 attack
23/tcp
[2019-06-21]1pkt
2019-06-21 23:39:33
137.74.158.99 attackbotsspam
wp brute-force
2019-06-21 23:43:40
199.249.230.72 attackbotsspam
Malicious Traffic/Form Submission
2019-06-22 00:03:43
190.111.232.7 attackspambots
Invalid user pi from 190.111.232.7 port 47078
2019-06-22 00:34:44
92.169.218.234 attackspambots
DATE:2019-06-21 11:09:36, IP:92.169.218.234, PORT:3306 - MySQL/MariaDB brute force auth on a honeypot server (epe-dc)
2019-06-22 00:30:11
182.58.63.241 attackspambots
23/tcp
[2019-06-21]1pkt
2019-06-21 23:42:57
36.78.248.84 attackspambots
445/tcp
[2019-06-21]1pkt
2019-06-21 23:34:37
85.132.37.4 attackbots
445/tcp
[2019-06-21]1pkt
2019-06-21 23:48:07
14.147.28.231 attackspambots
5500/tcp
[2019-06-21]1pkt
2019-06-21 23:52:11
23.89.100.98 attackbots
firewall-block, port(s): 445/tcp
2019-06-22 00:24:41

Recently Reported IPs

63.154.253.129 188.77.1.159 83.227.203.5 191.206.27.167
174.64.196.98 33.12.17.168 62.212.95.12 218.85.136.126
98.5.95.25 119.38.132.42 149.72.152.249 194.180.80.254
225.87.251.164 23.200.104.196 15.175.162.231 166.5.143.155
178.32.215.108 16.210.163.234 145.158.74.227 54.69.107.38