Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.64.134.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7374
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.64.134.148.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062700 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 01:23:57 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 148.134.64.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.134.64.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.173.149.143 attack
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-05-05 18:17:17
114.113.227.162 attackspambots
firewall-block, port(s): 1433/tcp
2020-05-05 18:39:25
175.6.118.181 attackbots
RDP brute forcing (d)
2020-05-05 18:26:18
222.186.175.167 attackbotsspam
May  5 10:23:13 sshgateway sshd\[3448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167  user=root
May  5 10:23:15 sshgateway sshd\[3448\]: Failed password for root from 222.186.175.167 port 61676 ssh2
May  5 10:23:28 sshgateway sshd\[3448\]: error: maximum authentication attempts exceeded for root from 222.186.175.167 port 61676 ssh2 \[preauth\]
2020-05-05 18:31:17
104.248.209.204 attackspam
May  5 11:10:44 xeon sshd[8412]: Failed password for invalid user usu from 104.248.209.204 port 50116 ssh2
2020-05-05 18:55:00
112.212.168.31 attack
firewall-block, port(s): 23/tcp
2020-05-05 18:41:39
107.173.202.231 attackbots
(From claudiauclement@yahoo.com) Hi, We are wondering if you would be interested in our service, where we can provide you with a dofollow link from Amazon (DA 96) back to svchiropractic.com?

The price is just $67 per link, via Paypal.

To explain what DA is and the benefit for your website, along with a sample of an existing link, please read here: https://justpaste.it/6jp87

If you'd be interested in learning more, reply to this email but please make sure you include the word INTERESTED in the subject line field, so we can get to your reply sooner.

Kind Regards,
Claudia
2020-05-05 18:22:57
103.99.17.119 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-05 18:44:31
46.238.53.245 attackbotsspam
May  5 05:32:27 ny01 sshd[3651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.238.53.245
May  5 05:32:28 ny01 sshd[3651]: Failed password for invalid user igor from 46.238.53.245 port 55998 ssh2
May  5 05:36:34 ny01 sshd[4170]: Failed password for root from 46.238.53.245 port 37604 ssh2
2020-05-05 18:21:13
80.255.130.197 attackspambots
May  5 11:20:38 electroncash sshd[37189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.255.130.197 
May  5 11:20:38 electroncash sshd[37189]: Invalid user future from 80.255.130.197 port 35710
May  5 11:20:40 electroncash sshd[37189]: Failed password for invalid user future from 80.255.130.197 port 35710 ssh2
May  5 11:21:54 electroncash sshd[37526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.255.130.197  user=root
May  5 11:21:57 electroncash sshd[37526]: Failed password for root from 80.255.130.197 port 43762 ssh2
...
2020-05-05 18:57:34
23.236.217.19 attackbotsspam
(mod_security) mod_security (id:210492) triggered by 23.236.217.19 (CA/Canada/countershafts.betahousehelp.com): 5 in the last 3600 secs
2020-05-05 18:43:30
202.40.190.227 attackbots
Unauthorized SSH connection attempt
2020-05-05 18:24:18
46.60.21.164 attackspambots
1588670399 - 05/05/2020 16:19:59 Host: 46.60.21.164/46.60.21.164 Port: 23 TCP Blocked
...
2020-05-05 18:58:04
189.112.228.153 attackbots
May  5 11:15:45 xeon sshd[8997]: Failed password for root from 189.112.228.153 port 45545 ssh2
2020-05-05 18:53:36
170.106.38.190 attackspambots
prod3
...
2020-05-05 18:37:52

Recently Reported IPs

116.105.95.9 15.44.217.165 146.65.85.191 142.13.187.193
140.169.30.35 14.156.198.61 14.237.205.143 14.234.0.200
137.23.40.130 137.240.53.118 135.24.73.30 135.37.117.183
136.107.44.59 133.191.41.131 132.133.210.34 129.110.255.220
132.142.36.106 126.208.61.205 126.213.133.167 126.231.243.167