Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.81.166.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37576
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.81.166.139.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 14:46:27 CST 2022
;; MSG SIZE  rcvd: 107
Host info
139.166.81.149.in-addr.arpa domain name pointer 8b.a6.5195.ip4.static.sl-reverse.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.166.81.149.in-addr.arpa	name = 8b.a6.5195.ip4.static.sl-reverse.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
124.158.164.146 attackbotsspam
Aug 17 07:39:43 home sshd[335842]: Invalid user plesk from 124.158.164.146 port 36630
Aug 17 07:39:43 home sshd[335842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.158.164.146 
Aug 17 07:39:43 home sshd[335842]: Invalid user plesk from 124.158.164.146 port 36630
Aug 17 07:39:45 home sshd[335842]: Failed password for invalid user plesk from 124.158.164.146 port 36630 ssh2
Aug 17 07:44:18 home sshd[337505]: Invalid user ts3srv from 124.158.164.146 port 47886
...
2020-08-17 14:04:44
64.227.94.45 attackspam
[Sat Aug 08 02:51:29 2020] - DDoS Attack From IP: 64.227.94.45 Port: 47793
2020-08-17 13:36:40
36.239.234.4 attack
Unauthorised access (Aug 17) SRC=36.239.234.4 LEN=52 TTL=109 ID=22933 DF TCP DPT=445 WINDOW=8192 SYN
2020-08-17 14:00:40
197.157.219.168 attackspambots
spam
2020-08-17 13:32:55
139.155.127.59 attack
2020-08-17T03:51:28.155958abusebot-6.cloudsearch.cf sshd[21077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.127.59  user=root
2020-08-17T03:51:30.326939abusebot-6.cloudsearch.cf sshd[21077]: Failed password for root from 139.155.127.59 port 41282 ssh2
2020-08-17T03:55:04.984262abusebot-6.cloudsearch.cf sshd[21079]: Invalid user mysql from 139.155.127.59 port 57194
2020-08-17T03:55:04.989902abusebot-6.cloudsearch.cf sshd[21079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.127.59
2020-08-17T03:55:04.984262abusebot-6.cloudsearch.cf sshd[21079]: Invalid user mysql from 139.155.127.59 port 57194
2020-08-17T03:55:07.481821abusebot-6.cloudsearch.cf sshd[21079]: Failed password for invalid user mysql from 139.155.127.59 port 57194 ssh2
2020-08-17T03:58:55.789835abusebot-6.cloudsearch.cf sshd[21084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.
...
2020-08-17 14:04:21
222.186.42.137 attack
Aug 17 08:11:26 server2 sshd\[32635\]: User root from 222.186.42.137 not allowed because not listed in AllowUsers
Aug 17 08:13:03 server2 sshd\[32721\]: User root from 222.186.42.137 not allowed because not listed in AllowUsers
Aug 17 08:13:05 server2 sshd\[32720\]: User root from 222.186.42.137 not allowed because not listed in AllowUsers
Aug 17 08:18:09 server2 sshd\[609\]: User root from 222.186.42.137 not allowed because not listed in AllowUsers
Aug 17 08:19:56 server2 sshd\[653\]: User root from 222.186.42.137 not allowed because not listed in AllowUsers
Aug 17 08:20:13 server2 sshd\[848\]: User root from 222.186.42.137 not allowed because not listed in AllowUsers
2020-08-17 13:30:28
49.233.70.228 attackspambots
Aug 17 08:23:09 lukav-desktop sshd\[3994\]: Invalid user milling from 49.233.70.228
Aug 17 08:23:09 lukav-desktop sshd\[3994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.70.228
Aug 17 08:23:11 lukav-desktop sshd\[3994\]: Failed password for invalid user milling from 49.233.70.228 port 35002 ssh2
Aug 17 08:28:46 lukav-desktop sshd\[7395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.70.228  user=root
Aug 17 08:28:48 lukav-desktop sshd\[7395\]: Failed password for root from 49.233.70.228 port 39828 ssh2
2020-08-17 13:42:29
45.148.10.114 attackspam
spam
2020-08-17 13:35:44
157.55.196.184 attackspam
Brute forcing email accounts
2020-08-17 14:01:54
81.95.131.10 attack
spam
2020-08-17 13:35:18
86.110.175.86 attackbotsspam
spam
2020-08-17 13:39:31
86.34.157.3 attackspam
spam
2020-08-17 14:00:19
174.105.118.96 attackbotsspam
spam
2020-08-17 13:41:37
187.190.109.142 attack
Aug 17 06:01:46 *hidden* sshd[13822]: Invalid user testftp from 187.190.109.142 port 43990 Aug 17 06:01:46 *hidden* sshd[13822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.190.109.142 Aug 17 06:01:47 *hidden* sshd[13822]: Failed password for invalid user testftp from 187.190.109.142 port 43990 ssh2 Aug 17 06:03:43 *hidden* sshd[18668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.190.109.142 user=root Aug 17 06:03:45 *hidden* sshd[18668]: Failed password for *hidden* from 187.190.109.142 port 45820 ssh2
2020-08-17 13:56:22
49.233.208.45 attackspambots
Aug 17 07:08:33 PorscheCustomer sshd[28165]: Failed password for root from 49.233.208.45 port 48034 ssh2
Aug 17 07:13:06 PorscheCustomer sshd[28425]: Failed password for root from 49.233.208.45 port 41156 ssh2
...
2020-08-17 14:02:44

Recently Reported IPs

149.72.37.212 15.152.1.230 15.152.106.11 15.152.111.183
15.152.105.109 15.152.110.70 15.152.101.215 15.152.114.158
149.86.82.5 15.152.114.227 15.152.113.46 15.152.114.214
15.152.114.76 15.152.106.181 15.152.164.172 15.152.155.179
15.152.115.161 15.152.20.183 15.152.165.163 15.152.20.192