Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nizhniy Novgorod

Region: Nizhny Novgorod Oblast

Country: Russia

Internet Service Provider: unknown

Hostname: unknown

Organization: PVimpelCom

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.62.8.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18272
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;149.62.8.149.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060601 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jun 07 02:40:43 CST 2019
;; MSG SIZE  rcvd: 116

Host info
149.8.62.149.in-addr.arpa domain name pointer dyn-8-62-149-149.fttbee.kis.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.8.62.149.in-addr.arpa	name = dyn-8-62-149-149.fttbee.kis.ru.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
45.119.153.47 attackspam
Unauthorized connection attempt from IP address 45.119.153.47 on Port 445(SMB)
2020-01-15 20:00:44
113.91.208.60 attack
20/1/14@23:46:00: FAIL: Alarm-Network address from=113.91.208.60
20/1/14@23:46:00: FAIL: Alarm-Network address from=113.91.208.60
...
2020-01-15 20:00:24
5.112.77.111 attackspambots
Unauthorized connection attempt from IP address 5.112.77.111 on Port 445(SMB)
2020-01-15 19:52:11
180.190.117.16 attack
Unauthorized connection attempt from IP address 180.190.117.16 on Port 445(SMB)
2020-01-15 19:52:55
146.0.209.72 attackspambots
Jan 15 12:35:39 xeon sshd[38370]: Failed password for invalid user abc from 146.0.209.72 port 49826 ssh2
2020-01-15 19:55:31
124.78.44.35 attack
Unauthorized connection attempt from IP address 124.78.44.35 on Port 445(SMB)
2020-01-15 20:18:58
123.20.228.162 attackbotsspam
Unauthorized connection attempt from IP address 123.20.228.162 on Port 445(SMB)
2020-01-15 20:05:09
103.17.39.140 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-01-15 20:22:09
164.68.120.168 attackspam
unauthorized connection attempt
2020-01-15 20:25:41
115.249.245.5 attack
SSH-bruteforce attempts
2020-01-15 20:04:15
104.131.97.47 attack
Unauthorized connection attempt detected from IP address 104.131.97.47 to port 2220 [J]
2020-01-15 20:13:01
122.183.97.90 attackspam
Jan 15 05:45:25 lnxded63 sshd[25259]: Failed password for root from 122.183.97.90 port 50592 ssh2
Jan 15 05:45:25 lnxded63 sshd[25259]: Failed password for root from 122.183.97.90 port 50592 ssh2
2020-01-15 20:26:18
109.96.84.46 attack
Unauthorized connection attempt detected from IP address 109.96.84.46 to port 1433 [J]
2020-01-15 20:30:05
14.242.195.187 attackbots
Unauthorized connection attempt from IP address 14.242.195.187 on Port 445(SMB)
2020-01-15 20:08:13
118.97.147.204 attackbots
unauthorized connection attempt
2020-01-15 20:10:09

Recently Reported IPs

117.69.24.244 191.187.149.251 199.203.149.167 167.58.40.67
113.187.117.164 113.208.232.6 42.114.30.24 207.162.95.1
186.23.102.241 208.239.150.67 78.19.128.187 199.34.70.131
104.158.160.128 180.189.78.128 122.159.238.105 90.246.139.72
196.77.60.78 78.188.155.220 221.34.173.180 186.146.222.126