Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.66.240.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14396
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.66.240.75.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 22:20:19 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 75.240.66.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 75.240.66.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.180.9 attackspambots
2020-04-07T03:08:29.632270homeassistant sshd[9023]: Failed password for root from 222.186.180.9 port 1570 ssh2
2020-04-07T10:59:31.911391homeassistant sshd[28617]: Failed none for root from 222.186.180.9 port 65134 ssh2
2020-04-07T10:59:32.148558homeassistant sshd[28617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
...
2020-04-07 19:02:46
221.194.137.28 attackspambots
$f2bV_matches
2020-04-07 18:57:01
198.245.50.81 attack
DATE:2020-04-07 11:30:22, IP:198.245.50.81, PORT:ssh SSH brute force auth (docker-dc)
2020-04-07 19:36:51
213.176.34.251 attackbots
Apr  7 12:21:15 minden010 sshd[27635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.176.34.251
Apr  7 12:21:17 minden010 sshd[27635]: Failed password for invalid user deploy from 213.176.34.251 port 33838 ssh2
Apr  7 12:25:14 minden010 sshd[28913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.176.34.251
...
2020-04-07 19:01:39
2.139.209.78 attackbotsspam
Apr  7 06:27:06 ny01 sshd[12662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78
Apr  7 06:27:08 ny01 sshd[12662]: Failed password for invalid user bot from 2.139.209.78 port 58826 ssh2
Apr  7 06:30:57 ny01 sshd[13277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78
2020-04-07 18:56:33
162.243.133.219 attack
Port 9200 scan denied
2020-04-07 19:10:37
36.77.31.249 attackspambots
Unauthorized connection attempt from IP address 36.77.31.249 on Port 445(SMB)
2020-04-07 19:23:22
49.232.81.191 attack
Apr  7 11:29:45 srv-ubuntu-dev3 sshd[109650]: Invalid user dreambox from 49.232.81.191
Apr  7 11:29:45 srv-ubuntu-dev3 sshd[109650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.81.191
Apr  7 11:29:45 srv-ubuntu-dev3 sshd[109650]: Invalid user dreambox from 49.232.81.191
Apr  7 11:29:47 srv-ubuntu-dev3 sshd[109650]: Failed password for invalid user dreambox from 49.232.81.191 port 47242 ssh2
Apr  7 11:35:08 srv-ubuntu-dev3 sshd[110625]: Invalid user hostmaster from 49.232.81.191
Apr  7 11:35:08 srv-ubuntu-dev3 sshd[110625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.81.191
Apr  7 11:35:08 srv-ubuntu-dev3 sshd[110625]: Invalid user hostmaster from 49.232.81.191
Apr  7 11:35:10 srv-ubuntu-dev3 sshd[110625]: Failed password for invalid user hostmaster from 49.232.81.191 port 45618 ssh2
...
2020-04-07 19:26:27
14.165.183.178 attack
1586231790 - 04/07/2020 05:56:30 Host: 14.165.183.178/14.165.183.178 Port: 445 TCP Blocked
2020-04-07 19:33:38
218.255.139.66 attackspam
detected by Fail2Ban
2020-04-07 19:22:34
87.229.197.132 attack
Unauthorized connection attempt from IP address 87.229.197.132 on Port 445(SMB)
2020-04-07 19:24:21
54.38.36.210 attack
Apr  7 11:16:33 vmd26974 sshd[17191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.36.210
Apr  7 11:16:35 vmd26974 sshd[17191]: Failed password for invalid user ubuntu from 54.38.36.210 port 46104 ssh2
...
2020-04-07 18:59:41
165.22.222.234 attack
Attempt to hack Wordpress Login, XMLRPC or other login
2020-04-07 19:23:43
222.186.30.76 attackbots
Apr  7 13:25:37 vmanager6029 sshd\[16405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
Apr  7 13:25:39 vmanager6029 sshd\[16403\]: error: PAM: Authentication failure for root from 222.186.30.76
Apr  7 13:25:39 vmanager6029 sshd\[16406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
2020-04-07 19:30:00
137.74.195.204 attackbots
Total attacks: 6
2020-04-07 19:03:28

Recently Reported IPs

221.109.139.0 251.211.126.147 157.122.40.126 45.91.148.11
165.147.144.91 2.168.64.71 224.109.49.236 21.220.3.218
22.86.110.198 36.0.2.52 191.153.58.61 43.126.174.126
12.175.64.144 6.36.200.178 180.109.59.115 73.45.170.255
162.229.182.58 64.56.237.246 36.101.18.200 76.228.121.147