Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.76.148.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46925
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.76.148.49.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 20:24:01 CST 2025
;; MSG SIZE  rcvd: 106
Host info
49.148.76.149.in-addr.arpa domain name pointer 149-76-148-49.fidnet.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.148.76.149.in-addr.arpa	name = 149-76-148-49.fidnet.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
108.190.26.114 attackspam
unauthorized connection attempt
2020-01-09 13:18:23
187.207.89.231 attack
unauthorized connection attempt
2020-01-09 13:14:26
37.3.168.157 attackbotsspam
unauthorized connection attempt
2020-01-09 13:10:23
64.185.96.172 attack
unauthorized connection attempt
2020-01-09 13:08:57
45.136.108.125 attackbots
unauthorized connection attempt
2020-01-09 13:09:27
42.234.244.33 attack
unauthorized connection attempt
2020-01-09 13:21:52
2.228.87.194 attackbotsspam
detected by Fail2Ban
2020-01-09 09:14:26
222.172.146.202 attack
unauthorized connection attempt
2020-01-09 13:00:39
95.47.248.21 attack
unauthorized connection attempt
2020-01-09 13:19:01
121.241.244.93 attackspambots
Unauthorized connection attempt detected from IP address 121.241.244.93 to port 22
2020-01-09 09:13:57
221.143.48.143 attackspambots
Jan  9 01:30:01 MK-Soft-VM5 sshd[14042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.143.48.143 
Jan  9 01:30:03 MK-Soft-VM5 sshd[14042]: Failed password for invalid user terri from 221.143.48.143 port 44942 ssh2
...
2020-01-09 09:10:21
122.154.241.147 attack
Jan  9 01:56:30 * sshd[20836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.154.241.147
Jan  9 01:56:33 * sshd[20836]: Failed password for invalid user automation from 122.154.241.147 port 54640 ssh2
2020-01-09 09:21:21
187.21.148.55 attackspambots
unauthorized connection attempt
2020-01-09 13:04:03
187.135.95.105 attackbots
unauthorized connection attempt
2020-01-09 13:03:30
122.234.173.199 attackbotsspam
unauthorized connection attempt
2020-01-09 13:06:14

Recently Reported IPs

127.6.208.104 118.55.47.183 240.66.110.95 205.110.112.218
54.177.231.247 13.50.232.152 215.248.64.2 243.146.102.89
218.15.244.150 139.25.0.209 127.8.177.192 104.2.183.177
109.247.9.30 12.7.188.155 38.137.18.57 82.131.74.253
244.153.23.141 119.170.99.28 202.127.55.94 135.228.240.13