Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.64.142.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8200
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.64.142.154.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 00:27:21 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 154.142.64.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 154.142.64.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.59.3.170 attack
Invalid user tests1 from 139.59.3.170 port 56210
2020-09-13 05:01:24
140.143.93.31 attack
Sep 12 20:30:03 ip-172-31-42-142 sshd\[14109\]: Failed password for root from 140.143.93.31 port 40056 ssh2\
Sep 12 20:34:23 ip-172-31-42-142 sshd\[14224\]: Invalid user mailman from 140.143.93.31\
Sep 12 20:34:24 ip-172-31-42-142 sshd\[14224\]: Failed password for invalid user mailman from 140.143.93.31 port 33548 ssh2\
Sep 12 20:38:57 ip-172-31-42-142 sshd\[14297\]: Invalid user admin from 140.143.93.31\
Sep 12 20:38:59 ip-172-31-42-142 sshd\[14297\]: Failed password for invalid user admin from 140.143.93.31 port 55288 ssh2\
2020-09-13 04:47:17
202.77.105.110 attackbots
$f2bV_matches
2020-09-13 04:52:34
113.66.197.223 attackspam
2020-09-13 05:02:43
222.186.175.151 attackspambots
Failed password for invalid user from 222.186.175.151 port 12764 ssh2
2020-09-13 05:07:37
191.119.188.46 attackbots
1599929944 - 09/12/2020 18:59:04 Host: 191.119.188.46/191.119.188.46 Port: 445 TCP Blocked
2020-09-13 04:59:51
211.159.172.184 attack
20 attempts against mh-ssh on ice
2020-09-13 04:56:52
115.148.72.248 attackbotsspam
Brute forcing email accounts
2020-09-13 04:58:10
222.186.173.215 attackbots
Sep 12 21:33:50 ajax sshd[32078]: Failed password for root from 222.186.173.215 port 1094 ssh2
Sep 12 21:33:54 ajax sshd[32078]: Failed password for root from 222.186.173.215 port 1094 ssh2
2020-09-13 04:44:47
111.47.18.22 attackspam
Sep 12 20:55:59 buvik sshd[32529]: Failed password for root from 111.47.18.22 port 2158 ssh2
Sep 12 21:01:55 buvik sshd[1347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.47.18.22  user=root
Sep 12 21:01:57 buvik sshd[1347]: Failed password for root from 111.47.18.22 port 2160 ssh2
...
2020-09-13 04:53:05
206.189.88.253 attack
Sep 12 22:46:09 localhost sshd\[29073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.88.253  user=root
Sep 12 22:46:11 localhost sshd\[29073\]: Failed password for root from 206.189.88.253 port 55004 ssh2
Sep 12 22:50:56 localhost sshd\[29298\]: Invalid user telecomadmin from 206.189.88.253
Sep 12 22:50:56 localhost sshd\[29298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.88.253
Sep 12 22:50:59 localhost sshd\[29298\]: Failed password for invalid user telecomadmin from 206.189.88.253 port 40316 ssh2
...
2020-09-13 04:51:56
78.128.113.120 attack
2020-09-12 22:45:28 dovecot_login authenticator failed for \(ip-113-120.4vendeta.com.\) \[78.128.113.120\]: 535 Incorrect authentication data \(set_id=info@orogest.it\)
2020-09-12 22:45:36 dovecot_login authenticator failed for \(ip-113-120.4vendeta.com.\) \[78.128.113.120\]: 535 Incorrect authentication data
2020-09-12 22:45:44 dovecot_login authenticator failed for \(ip-113-120.4vendeta.com.\) \[78.128.113.120\]: 535 Incorrect authentication data
2020-09-12 22:45:50 dovecot_login authenticator failed for \(ip-113-120.4vendeta.com.\) \[78.128.113.120\]: 535 Incorrect authentication data
2020-09-12 22:46:02 dovecot_login authenticator failed for \(ip-113-120.4vendeta.com.\) \[78.128.113.120\]: 535 Incorrect authentication data
2020-09-13 04:53:38
49.233.152.7 attack
 TCP (SYN) 49.233.152.7:58193 -> port 1433, len 52
2020-09-13 04:36:00
218.92.0.212 attack
Sep 12 22:37:36 vps639187 sshd\[11681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
Sep 12 22:37:38 vps639187 sshd\[11681\]: Failed password for root from 218.92.0.212 port 65276 ssh2
Sep 12 22:37:42 vps639187 sshd\[11681\]: Failed password for root from 218.92.0.212 port 65276 ssh2
...
2020-09-13 04:40:00
106.52.242.21 attackspambots
Sep 12 21:07:11 jane sshd[13734]: Failed password for root from 106.52.242.21 port 40860 ssh2
...
2020-09-13 05:04:07

Recently Reported IPs

48.200.46.223 226.102.28.125 9.211.76.15 58.87.141.68
108.163.102.207 40.6.152.223 191.96.90.27 212.252.83.133
157.79.118.155 33.35.181.130 107.178.244.193 170.26.249.117
197.96.134.155 66.68.141.67 60.144.150.59 152.188.141.149
19.116.149.215 167.100.172.158 43.109.196.186 29.255.175.38