Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.90.96.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5861
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.90.96.22.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 03:49:38 CST 2025
;; MSG SIZE  rcvd: 105
Host info
22.96.90.149.in-addr.arpa domain name pointer 22.96.90.149.rev.vodafone.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
22.96.90.149.in-addr.arpa	name = 22.96.90.149.rev.vodafone.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
95.85.33.119 attackspam
Mar 25 02:51:09 ws12vmsma01 sshd[24780]: Invalid user vinay from 95.85.33.119
Mar 25 02:51:12 ws12vmsma01 sshd[24780]: Failed password for invalid user vinay from 95.85.33.119 port 34608 ssh2
Mar 25 02:58:24 ws12vmsma01 sshd[25868]: Invalid user ubuntu from 95.85.33.119
...
2020-03-25 14:37:34
117.27.88.61 attackspambots
$f2bV_matches
2020-03-25 14:20:40
159.203.27.98 attack
$f2bV_matches
2020-03-25 14:22:09
107.170.109.82 attackbotsspam
Mar 25 08:57:27 hosting sshd[18093]: Invalid user contact from 107.170.109.82 port 44775
...
2020-03-25 14:19:08
187.157.135.152 attackspam
Mar 25 05:27:01 game-panel sshd[12208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.157.135.152
Mar 25 05:27:03 game-panel sshd[12208]: Failed password for invalid user uk from 187.157.135.152 port 58466 ssh2
Mar 25 05:31:04 game-panel sshd[12394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.157.135.152
2020-03-25 14:36:33
151.80.38.43 attack
(sshd) Failed SSH login from 151.80.38.43 (FR/France/ns3004077.ip-151-80-38.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 25 06:54:54 amsweb01 sshd[29389]: Invalid user qi from 151.80.38.43 port 60604
Mar 25 06:54:55 amsweb01 sshd[29389]: Failed password for invalid user qi from 151.80.38.43 port 60604 ssh2
Mar 25 07:06:28 amsweb01 sshd[30871]: Invalid user pt from 151.80.38.43 port 36818
Mar 25 07:06:30 amsweb01 sshd[30871]: Failed password for invalid user pt from 151.80.38.43 port 36818 ssh2
Mar 25 07:09:41 amsweb01 sshd[31278]: Invalid user test from 151.80.38.43 port 42026
2020-03-25 14:39:23
208.109.11.224 attack
208.109.11.224 - - [25/Mar/2020:06:36:57 +0100] "POST /wp-login.php HTTP/1.0" 200 2195 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
208.109.11.224 - - [25/Mar/2020:06:37:00 +0100] "POST /wp-login.php HTTP/1.0" 200 2184 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-03-25 13:57:11
222.186.31.127 attackspambots
[MK-VM6] SSH login failed
2020-03-25 14:45:18
51.77.212.235 attack
Invalid user d from 51.77.212.235 port 44930
2020-03-25 14:07:23
106.12.209.63 attackbotsspam
Mar 24 20:16:29 php1 sshd\[13910\]: Invalid user jolan from 106.12.209.63
Mar 24 20:16:29 php1 sshd\[13910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.209.63
Mar 24 20:16:31 php1 sshd\[13910\]: Failed password for invalid user jolan from 106.12.209.63 port 59004 ssh2
Mar 24 20:18:03 php1 sshd\[14082\]: Invalid user sh from 106.12.209.63
Mar 24 20:18:03 php1 sshd\[14082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.209.63
2020-03-25 14:22:24
167.71.142.180 attack
Invalid user it from 167.71.142.180 port 41670
2020-03-25 14:04:29
104.225.159.30 attack
$f2bV_matches
2020-03-25 14:35:18
190.202.40.53 attack
$f2bV_matches
2020-03-25 13:58:51
185.131.50.122 attack
Received: from [185.131.50.122] (port=37294 helo=server.kobazoglu.com)
	by sg3plcpnl0224.prod.sin3.secureserver.net with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
	(Exim 4.92)
	(envelope-from )
	id 1jGvB1-006NUA-GN
2020-03-25 14:46:17
206.189.202.165 attackspambots
Invalid user ov from 206.189.202.165 port 47726
2020-03-25 14:18:34

Recently Reported IPs

131.62.132.252 247.133.231.87 155.210.217.130 101.229.65.80
75.63.94.35 43.126.93.183 253.214.43.98 212.16.169.68
143.27.136.72 225.198.134.8 124.110.25.161 174.0.58.159
250.159.4.68 4.176.41.216 87.78.25.234 163.44.22.152
109.28.100.164 121.190.233.16 131.207.253.196 248.169.66.55