Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.90.224.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14973
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.90.224.222.			IN	A

;; AUTHORITY SECTION:
.			161	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 10:06:28 CST 2022
;; MSG SIZE  rcvd: 107
Host info
222.224.90.149.in-addr.arpa domain name pointer 222.224.90.149.rev.vodafone.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
222.224.90.149.in-addr.arpa	name = 222.224.90.149.rev.vodafone.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
192.71.103.173 attackbotsspam
/humans.txt
2020-04-05 11:22:36
212.200.237.122 attackbots
Brute force attack stopped by firewall
2020-04-05 10:59:54
179.125.172.210 attack
Sending SPAM email
2020-04-05 11:14:13
140.86.12.31 attackbots
Apr  5 05:09:15 localhost sshd[12073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-140-86-12-31.compute.oraclecloud.com  user=root
Apr  5 05:09:17 localhost sshd[12073]: Failed password for root from 140.86.12.31 port 31040 ssh2
...
2020-04-05 11:14:38
195.9.80.22 attack
Brute force attack stopped by firewall
2020-04-05 10:47:36
51.254.32.133 attackspambots
$f2bV_matches
2020-04-05 10:49:19
183.81.152.82 attackspambots
Sending SPAM email
2020-04-05 11:09:50
167.99.194.54 attackbotsspam
$f2bV_matches
2020-04-05 10:54:55
64.139.79.35 attack
Sent Mail to address hacked/leaked/bought from crystalproductions.cz between 2011 and 2018
2020-04-05 10:59:06
200.77.186.212 attackspam
Brute force attack stopped by firewall
2020-04-05 11:06:39
177.84.146.44 attackbots
Brute force attack stopped by firewall
2020-04-05 11:08:59
46.172.223.250 attackbots
Brute force attack stopped by firewall
2020-04-05 11:20:35
103.37.82.118 attack
Brute force attack stopped by firewall
2020-04-05 11:01:38
167.172.234.64 attack
2020-04-05T01:46:17.808995Z c8a31759596a New connection: 167.172.234.64:42788 (172.17.0.4:2222) [session: c8a31759596a]
2020-04-05T01:52:47.300943Z 521c858e5bef New connection: 167.172.234.64:54048 (172.17.0.4:2222) [session: 521c858e5bef]
2020-04-05 11:24:34
185.51.92.103 attackbotsspam
Brute force attack stopped by firewall
2020-04-05 11:18:37

Recently Reported IPs

149.56.195.176 15.160.248.255 149.90.186.23 15.188.74.228
15.161.132.108 15.188.207.74 15.204.129.185 15.207.55.10
15.160.24.185 149.91.182.188 15.235.46.151 15.235.47.60
150.107.232.6 150.116.38.70 150.158.100.46 150.129.82.211
150.129.197.236 150.107.10.70 15.228.219.40 15.228.181.115