Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.78.239.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54831
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.78.239.212.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 00:26:57 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 212.239.78.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 212.239.78.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
221.7.253.18 attackspam
$f2bV_matches
2019-07-17 05:07:36
94.172.182.83 attackbotsspam
Jul 16 17:56:27 itv-usvr-01 sshd[15506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.172.182.83  user=root
Jul 16 17:56:29 itv-usvr-01 sshd[15506]: Failed password for root from 94.172.182.83 port 41492 ssh2
Jul 16 18:02:03 itv-usvr-01 sshd[15740]: Invalid user demo from 94.172.182.83
Jul 16 18:02:03 itv-usvr-01 sshd[15740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.172.182.83
Jul 16 18:02:03 itv-usvr-01 sshd[15740]: Invalid user demo from 94.172.182.83
Jul 16 18:02:05 itv-usvr-01 sshd[15740]: Failed password for invalid user demo from 94.172.182.83 port 40507 ssh2
2019-07-17 04:58:09
86.104.32.187 attackbots
WordPress brute force
2019-07-17 04:52:45
67.229.237.61 attack
Postfix RBL failed
2019-07-17 05:17:24
185.211.245.170 attack
Jul 16 23:03:14 relay postfix/smtpd\[15645\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 23:03:29 relay postfix/smtpd\[24669\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 23:11:41 relay postfix/smtpd\[31056\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 23:11:53 relay postfix/smtpd\[24669\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 23:11:57 relay postfix/smtpd\[2169\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-07-17 05:18:30
117.119.83.84 attackbotsspam
Jul 16 11:28:19 db sshd\[8099\]: Invalid user airdamin from 117.119.83.84
Jul 16 11:28:19 db sshd\[8099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.119.83.84 
Jul 16 11:28:21 db sshd\[8099\]: Failed password for invalid user airdamin from 117.119.83.84 port 38126 ssh2
Jul 16 11:29:21 db sshd\[8107\]: Invalid user test from 117.119.83.84
Jul 16 11:29:21 db sshd\[8107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.119.83.84 
...
2019-07-17 04:51:53
46.101.204.20 attack
Jul 16 23:05:58 vps691689 sshd[6452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.204.20
Jul 16 23:05:59 vps691689 sshd[6452]: Failed password for invalid user admin123 from 46.101.204.20 port 55888 ssh2
Jul 16 23:11:56 vps691689 sshd[6500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.204.20
...
2019-07-17 05:19:28
134.73.129.134 attack
2019-07-08T00:01:06.854074m3.viererban.de sshd[3761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.73.129.134
2019-07-08T00:01:08.032633m3.viererban.de sshd[3761]: Failed password for invalid user antonio from 134.73.129.134 port 37236 ssh2
2019-07-16T17:44:53.778222m3.viererban.de sshd[4107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.73.129.134
2019-07-16T17:44:55.682124m3.viererban.de sshd[4107]: Failed password for invalid user demo from 134.73.129.134 port 59964 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=134.73.129.134
2019-07-17 05:03:22
203.99.117.146 attack
SPF Fail sender not permitted to send mail for @123.net
2019-07-17 04:46:23
189.197.60.170 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-16 05:25:18,452 INFO [shellcode_manager] (189.197.60.170) no match, writing hexdump (7cdf2ec49f596a345114099b450493dc :2220576) - MS17010 (EternalBlue)
2019-07-17 05:11:38
104.144.208.141 attack
Looking for resource vulnerabilities
2019-07-17 05:25:04
200.149.7.204 attackbotsspam
2019-07-16T11:01:20.435685abusebot-7.cloudsearch.cf sshd\[10287\]: Invalid user kv from 200.149.7.204 port 48531
2019-07-17 05:04:58
157.230.225.77 attackspambots
Jul 15 15:34:36 *** sshd[8983]: Failed password for invalid user qq from 157.230.225.77 port 52072 ssh2
Jul 15 15:41:02 *** sshd[9102]: Failed password for invalid user tju1 from 157.230.225.77 port 50078 ssh2
Jul 15 15:45:23 *** sshd[9204]: Failed password for invalid user mercedes from 157.230.225.77 port 48434 ssh2
Jul 15 15:49:40 *** sshd[9238]: Failed password for invalid user test from 157.230.225.77 port 46796 ssh2
Jul 15 15:53:58 *** sshd[9268]: Failed password for invalid user ftpuser from 157.230.225.77 port 45184 ssh2
Jul 15 15:58:23 *** sshd[9310]: Failed password for invalid user support from 157.230.225.77 port 43536 ssh2
Jul 15 16:02:46 *** sshd[9397]: Failed password for invalid user norine from 157.230.225.77 port 41888 ssh2
Jul 15 16:07:16 *** sshd[9476]: Failed password for invalid user transfer from 157.230.225.77 port 40286 ssh2
Jul 15 16:11:38 *** sshd[9573]: Failed password for invalid user fake from 157.230.225.77 port 38638 ssh2
Jul 15 16:20:37 *** sshd[9680]: Failed password for inva
2019-07-17 05:05:47
67.216.131.181 attack
POP
2019-07-17 05:25:27
36.26.75.58 attackbots
SSH Brute-Forcing (ownc)
2019-07-17 04:49:12

Recently Reported IPs

3.103.157.213 200.87.36.147 19.151.217.54 201.119.113.192
59.41.127.255 50.117.75.124 133.126.132.154 41.101.25.122
224.208.98.142 242.98.216.217 189.164.155.6 218.252.226.179
198.148.232.24 181.226.201.125 67.208.135.147 8.4.147.238
189.190.238.241 240.95.204.133 140.215.212.97 93.186.54.140