Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       149.84.0.0 - 149.84.255.255
CIDR:           149.84.0.0/16
NetName:        ALFRED
NetHandle:      NET-149-84-0-0-1
Parent:         NET149 (NET-149-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Alfred University (ALFRED-Z)
RegDate:        1992-01-28
Updated:        2024-10-29
Ref:            https://rdap.arin.net/registry/ip/149.84.0.0


OrgName:        Alfred University
OrgId:          ALFRED-Z
Address:        One Saxon Drive
City:           Alfred
StateProv:      NY
PostalCode:     14802
Country:        US
RegDate:        2024-10-29
Updated:        2024-10-29
Ref:            https://rdap.arin.net/registry/entity/ALFRED-Z


OrgAbuseHandle: NETWO1438-ARIN
OrgAbuseName:   Network Services
OrgAbusePhone:  +1-607-871-2715 
OrgAbuseEmail:  netsvc@alfred.edu
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NETWO1438-ARIN

OrgTechHandle: NETWO1438-ARIN
OrgTechName:   Network Services
OrgTechPhone:  +1-607-871-2715 
OrgTechEmail:  netsvc@alfred.edu
OrgTechRef:    https://rdap.arin.net/registry/entity/NETWO1438-ARIN

OrgNOCHandle: NETWO1438-ARIN
OrgNOCName:   Network Services
OrgNOCPhone:  +1-607-871-2715 
OrgNOCEmail:  netsvc@alfred.edu
OrgNOCRef:    https://rdap.arin.net/registry/entity/NETWO1438-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.84.43.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1004
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.84.43.169.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031900 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 19 21:09:02 CST 2026
;; MSG SIZE  rcvd: 106
Host info
b'Host 169.43.84.149.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 149.84.43.169.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
171.234.232.64 attackspam
Unauthorized connection attempt from IP address 171.234.232.64 on Port 445(SMB)
2019-11-28 22:09:13
201.20.77.109 attack
Unauthorized connection attempt from IP address 201.20.77.109 on Port 445(SMB)
2019-11-28 22:41:02
54.37.230.15 attack
2019-11-28T09:51:07.226825abusebot.cloudsearch.cf sshd\[17090\]: Invalid user demouser from 54.37.230.15 port 39814
2019-11-28T09:51:07.231606abusebot.cloudsearch.cf sshd\[17090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=15.ip-54-37-230.eu
2019-11-28 22:21:41
61.5.29.117 attackspam
Unauthorized connection attempt from IP address 61.5.29.117 on Port 445(SMB)
2019-11-28 22:13:25
117.71.53.105 attackspam
sshd jail - ssh hack attempt
2019-11-28 22:14:15
103.50.78.240 attackbotsspam
Unauthorized connection attempt from IP address 103.50.78.240 on Port 445(SMB)
2019-11-28 22:31:59
101.255.81.91 attackbots
Nov 27 21:21:59 web1 sshd\[10372\]: Invalid user donnajean from 101.255.81.91
Nov 27 21:21:59 web1 sshd\[10372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.255.81.91
Nov 27 21:22:01 web1 sshd\[10372\]: Failed password for invalid user donnajean from 101.255.81.91 port 38866 ssh2
Nov 27 21:26:14 web1 sshd\[10784\]: Invalid user opinia from 101.255.81.91
Nov 27 21:26:14 web1 sshd\[10784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.255.81.91
2019-11-28 22:27:07
118.70.183.195 attackspam
Unauthorized connection attempt from IP address 118.70.183.195 on Port 445(SMB)
2019-11-28 22:20:11
191.5.130.69 attackbots
Nov 28 15:08:04 * sshd[4572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.5.130.69
Nov 28 15:08:06 * sshd[4572]: Failed password for invalid user braunwalder from 191.5.130.69 port 42052 ssh2
2019-11-28 22:34:22
222.186.173.142 attackbots
Nov 28 14:48:04 thevastnessof sshd[17578]: Failed password for root from 222.186.173.142 port 32760 ssh2
...
2019-11-28 22:48:45
113.62.176.97 attack
2019-11-28T07:18:25.734851abusebot-2.cloudsearch.cf sshd\[2497\]: Invalid user elye from 113.62.176.97 port 21653
2019-11-28 22:30:04
114.141.50.171 attack
$f2bV_matches
2019-11-28 22:28:01
80.174.192.39 attackspam
DATE:2019-11-28 07:17:30, IP:80.174.192.39, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-11-28 22:33:11
200.175.5.163 attackbotsspam
Unauthorized connection attempt from IP address 200.175.5.163 on Port 445(SMB)
2019-11-28 22:41:47
122.154.100.65 attack
Unauthorized connection attempt from IP address 122.154.100.65 on Port 445(SMB)
2019-11-28 22:44:15

Recently Reported IPs

122.193.247.134 2606:4700:10::6814:4625 2606:4700:10::ac43:1260 2606:4700:10::6816:2098
2606:4700:10::6814:9928 2606:4700:10::ac43:1207 2606:4700:10::6814:4726 121.237.149.205
148.149.134.162 146.233.150.151 146.136.193.18 165.22.243.79
144.177.176.6 143.123.162.19 141.84.13.92 140.123.108.11
39.100.71.203 39.100.80.115 121.234.219.148 2606:4700:10::6814:4613