Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.72.222.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6689
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.72.222.9.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 20:28:54 CST 2025
;; MSG SIZE  rcvd: 105
Host info
9.222.72.149.in-addr.arpa domain name pointer o1.ptr8622.howest.be.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
9.222.72.149.in-addr.arpa	name = o1.ptr8622.howest.be.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
176.120.196.75 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 15:08:16
77.87.96.226 attackbotsspam
unauthorized connection attempt
2020-02-16 15:45:36
37.156.113.9 attack
unauthorized connection attempt
2020-02-16 15:29:04
176.120.199.250 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 15:04:46
121.62.107.97 attack
unauthorized connection attempt
2020-02-16 15:26:39
144.76.174.242 attack
Feb 16 08:17:03 grey postfix/smtp\[22793\]: 6A713305A800: to=\, relay=mx.df.com.cust.b.hostedemail.com\[64.98.36.4\]:25, delay=269287, delays=269287/0.1/0.42/0, dsn=4.7.1, status=deferred \(host mx.df.com.cust.b.hostedemail.com\[64.98.36.4\] refused to talk to me: 554 5.7.1 Service unavailable\; Client host \[144.76.174.242\] blocked using urbl.hostedemail.com\; Your IP has been manually blacklisted\)
...
2020-02-16 15:26:22
140.249.20.167 attack
unauthorized connection attempt
2020-02-16 15:36:20
123.189.90.27 attack
unauthorized connection attempt
2020-02-16 15:41:06
142.4.1.81 attack
Feb 16 05:57:13 grey postfix/smtpd\[14895\]: NOQUEUE: reject: RCPT from 142-4-1-81.unifiedlayer.com\[142.4.1.81\]: 554 5.7.1 Service unavailable\; Client host \[142.4.1.81\] blocked using bl.spamcop.net\; Blocked - see https://www.spamcop.net/bl.shtml\?142.4.1.81\; from=\ to=\ proto=ESMTP helo=\<142-4-1-81.webhostbox.net\>
...
2020-02-16 15:05:36
218.102.128.214 attack
Honeypot attack, port: 5555, PTR: pcd596214.netvigator.com.
2020-02-16 15:37:33
118.71.213.10 attack
unauthorized connection attempt
2020-02-16 15:16:00
45.134.179.57 attack
Feb 16 08:10:46 debian-2gb-nbg1-2 kernel: \[4096267.863712\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.134.179.57 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=49389 PROTO=TCP SPT=55016 DPT=28947 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-16 15:18:51
49.206.200.237 attack
unauthorized connection attempt
2020-02-16 15:35:09
176.12.98.42 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 15:33:19
181.92.77.230 attack
unauthorized connection attempt
2020-02-16 15:07:06

Recently Reported IPs

58.113.155.219 152.246.65.113 135.48.36.27 99.183.215.210
142.191.124.173 52.75.131.59 4.46.145.40 162.218.33.46
142.77.170.14 197.87.7.153 14.95.22.75 146.102.163.166
221.166.230.87 92.154.106.125 202.196.87.165 12.50.156.85
124.148.222.47 231.44.50.11 119.60.222.9 66.231.185.74