Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.64.67.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35400
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.64.67.241.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022702 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 04:31:53 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 241.67.64.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 241.67.64.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
181.48.134.66 attackspambots
Sep 23 03:28:39 hpm sshd\[31021\]: Invalid user easy from 181.48.134.66
Sep 23 03:28:39 hpm sshd\[31021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.134.66
Sep 23 03:28:41 hpm sshd\[31021\]: Failed password for invalid user easy from 181.48.134.66 port 55040 ssh2
Sep 23 03:32:50 hpm sshd\[31358\]: Invalid user zang from 181.48.134.66
Sep 23 03:32:50 hpm sshd\[31358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.134.66
2019-09-23 21:43:43
51.75.170.13 attackspambots
Sep 23 15:18:30 SilenceServices sshd[4520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.170.13
Sep 23 15:18:32 SilenceServices sshd[4520]: Failed password for invalid user xz@123 from 51.75.170.13 port 46648 ssh2
Sep 23 15:22:33 SilenceServices sshd[5937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.170.13
2019-09-23 21:40:46
194.61.24.29 attackspam
Automatic report - Banned IP Access
2019-09-23 21:10:50
222.186.30.165 attackbotsspam
Sep 23 03:03:39 hiderm sshd\[5754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.165  user=root
Sep 23 03:03:42 hiderm sshd\[5754\]: Failed password for root from 222.186.30.165 port 52150 ssh2
Sep 23 03:03:44 hiderm sshd\[5754\]: Failed password for root from 222.186.30.165 port 52150 ssh2
Sep 23 03:03:47 hiderm sshd\[5754\]: Failed password for root from 222.186.30.165 port 52150 ssh2
Sep 23 03:11:56 hiderm sshd\[6642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.165  user=root
2019-09-23 21:15:07
180.122.38.221 attackbotsspam
Brute force attempt
2019-09-23 21:29:09
129.204.85.17 attackbots
Automatic report - Banned IP Access
2019-09-23 21:26:09
45.82.153.35 attackbots
09/23/2019-14:41:36.050517 45.82.153.35 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 42
2019-09-23 21:18:09
222.186.169.194 attack
SSH Brute-Force attacks
2019-09-23 21:06:35
106.12.114.26 attackspam
Sep 23 03:30:23 php1 sshd\[24848\]: Invalid user rustserver from 106.12.114.26
Sep 23 03:30:23 php1 sshd\[24848\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.114.26
Sep 23 03:30:26 php1 sshd\[24848\]: Failed password for invalid user rustserver from 106.12.114.26 port 40080 ssh2
Sep 23 03:35:17 php1 sshd\[25718\]: Invalid user lx from 106.12.114.26
Sep 23 03:35:17 php1 sshd\[25718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.114.26
2019-09-23 21:39:52
61.223.89.237 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/61.223.89.237/ 
 TW - 1H : (2840)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 61.223.89.237 
 
 CIDR : 61.223.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 276 
  3H - 1102 
  6H - 2230 
 12H - 2742 
 24H - 2751 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-23 21:24:54
142.93.22.180 attackspambots
Sep 23 18:11:45 areeb-Workstation sshd[20222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.22.180
Sep 23 18:11:47 areeb-Workstation sshd[20222]: Failed password for invalid user jg from 142.93.22.180 port 48778 ssh2
...
2019-09-23 20:59:44
113.193.30.98 attackbots
Sep 23 15:27:00 MK-Soft-Root1 sshd[30457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.193.30.98 
Sep 23 15:27:02 MK-Soft-Root1 sshd[30457]: Failed password for invalid user www from 113.193.30.98 port 57424 ssh2
...
2019-09-23 21:32:09
132.232.137.161 attack
Sep 23 02:52:58 aiointranet sshd\[15964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.137.161  user=man
Sep 23 02:53:01 aiointranet sshd\[15964\]: Failed password for man from 132.232.137.161 port 36468 ssh2
Sep 23 02:58:34 aiointranet sshd\[16450\]: Invalid user duci from 132.232.137.161
Sep 23 02:58:34 aiointranet sshd\[16450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.137.161
Sep 23 02:58:36 aiointranet sshd\[16450\]: Failed password for invalid user duci from 132.232.137.161 port 50804 ssh2
2019-09-23 21:09:23
190.121.25.248 attackspam
Sep 23 08:52:35 ny01 sshd[3790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.121.25.248
Sep 23 08:52:37 ny01 sshd[3790]: Failed password for invalid user so from 190.121.25.248 port 55256 ssh2
Sep 23 08:58:05 ny01 sshd[5272]: Failed password for root from 190.121.25.248 port 41160 ssh2
2019-09-23 21:07:52
1.165.148.109 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/1.165.148.109/ 
 TW - 1H : (2836)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 1.165.148.109 
 
 CIDR : 1.165.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 273 
  3H - 1099 
  6H - 2226 
 12H - 2738 
 24H - 2747 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-23 21:35:19

Recently Reported IPs

243.120.11.100 168.49.59.65 243.118.49.175 119.79.227.236
145.48.106.137 53.55.98.240 124.232.186.41 42.113.106.208
80.74.103.31 226.1.64.160 172.163.87.189 61.186.234.9
80.110.120.94 109.48.183.45 95.33.199.32 130.132.176.84
240.35.113.132 94.69.240.164 172.140.84.243 234.2.216.114