Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.95.40.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 364
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.95.40.3.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 11:38:42 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 3.40.95.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 3.40.95.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
18.27.197.252 attackspam
Oct 12 21:36:36 vpn01 sshd[22228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.27.197.252
Oct 12 21:36:38 vpn01 sshd[22228]: Failed password for invalid user app from 18.27.197.252 port 46720 ssh2
...
2019-10-13 03:52:12
153.35.93.7 attackspam
Oct 12 16:12:39 firewall sshd[29828]: Failed password for root from 153.35.93.7 port 49981 ssh2
Oct 12 16:16:37 firewall sshd[29948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.35.93.7  user=root
Oct 12 16:16:39 firewall sshd[29948]: Failed password for root from 153.35.93.7 port 26892 ssh2
...
2019-10-13 03:55:14
137.74.25.247 attackbots
2019-10-12T18:49:32.417812shield sshd\[527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.25.247  user=root
2019-10-12T18:49:33.875662shield sshd\[527\]: Failed password for root from 137.74.25.247 port 39947 ssh2
2019-10-12T18:53:55.111359shield sshd\[1228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.25.247  user=root
2019-10-12T18:53:57.341929shield sshd\[1228\]: Failed password for root from 137.74.25.247 port 60345 ssh2
2019-10-12T18:58:17.327157shield sshd\[1594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.25.247  user=root
2019-10-13 03:27:39
113.80.86.2 attackspam
Oct 12 16:41:08 meumeu sshd[7139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.80.86.2 
Oct 12 16:41:10 meumeu sshd[7139]: Failed password for invalid user Mac2017 from 113.80.86.2 port 41396 ssh2
Oct 12 16:47:06 meumeu sshd[7964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.80.86.2 
...
2019-10-13 03:49:40
142.93.110.144 attackbotsspam
\[2019-10-12 15:12:31\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-12T15:12:31.415-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011442843032012",SessionID="0x7fc3ac4de928",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/142.93.110.144/49340",ACLName="no_extension_match"
\[2019-10-12 15:12:46\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-12T15:12:46.055-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441519470402",SessionID="0x7fc3ac5226d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/142.93.110.144/55682",ACLName="no_extension_match"
\[2019-10-12 15:14:19\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-12T15:14:19.690-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441519470402",SessionID="0x7fc3ac2ed548",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/142.93.110.144/64190",ACLName="n
2019-10-13 03:26:47
185.186.143.179 attackspam
firewall-block, port(s): 3391/tcp
2019-10-13 03:16:49
186.121.247.170 attack
" "
2019-10-13 03:54:45
144.217.79.233 attackbotsspam
Oct 12 16:48:15 lnxmail61 sshd[5125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.79.233
2019-10-13 03:46:03
60.182.34.97 attackspambots
Oct 12 10:02:51 eola postfix/smtpd[3512]: warning: hostname 97.34.182.60.broad.jh.zj.dynamic.163data.com.cn does not resolve to address 60.182.34.97: Name or service not known
Oct 12 10:02:51 eola postfix/smtpd[3512]: connect from unknown[60.182.34.97]
Oct 12 10:02:52 eola postfix/smtpd[3512]: lost connection after AUTH from unknown[60.182.34.97]
Oct 12 10:02:52 eola postfix/smtpd[3512]: disconnect from unknown[60.182.34.97] ehlo=1 auth=0/1 commands=1/2
Oct 12 10:02:52 eola postfix/smtpd[3512]: warning: hostname 97.34.182.60.broad.jh.zj.dynamic.163data.com.cn does not resolve to address 60.182.34.97: Name or service not known
Oct 12 10:02:52 eola postfix/smtpd[3512]: connect from unknown[60.182.34.97]
Oct 12 10:02:53 eola postfix/smtpd[3512]: lost connection after AUTH from unknown[60.182.34.97]
Oct 12 10:02:53 eola postfix/smtpd[3512]: disconnect from unknown[60.182.34.97] ehlo=1 auth=0/1 commands=1/2
Oct 12 10:02:53 eola postfix/smtpd[3512]: warning: hostname 97.34.18........
-------------------------------
2019-10-13 03:19:21
92.119.160.106 attack
Oct 12 20:48:10 h2177944 kernel: \[3782111.733436\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.106 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=3380 PROTO=TCP SPT=47093 DPT=10594 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 12 20:55:48 h2177944 kernel: \[3782570.208064\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.106 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=3811 PROTO=TCP SPT=47093 DPT=10962 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 12 20:56:31 h2177944 kernel: \[3782612.899894\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.106 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=50275 PROTO=TCP SPT=47093 DPT=10777 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 12 21:06:42 h2177944 kernel: \[3783223.530845\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.106 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=20058 PROTO=TCP SPT=47093 DPT=10837 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 12 21:10:05 h2177944 kernel: \[3783426.943968\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.106 DST=85.21
2019-10-13 03:16:18
138.201.64.18 attack
138.201.64.18 - - [12/Oct/2019:18:20:32 +0000] "GET / HTTP/1.1" 403 153 "-" "Mozilla/5.0 zgrab/0.x"
2019-10-13 03:30:02
182.23.45.132 attackspam
Oct 12 21:10:35 localhost sshd\[25332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.23.45.132  user=root
Oct 12 21:10:38 localhost sshd\[25332\]: Failed password for root from 182.23.45.132 port 38174 ssh2
Oct 12 21:14:44 localhost sshd\[25766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.23.45.132  user=root
2019-10-13 03:24:29
220.167.100.60 attackspam
Invalid user user from 220.167.100.60 port 40614
2019-10-13 03:43:41
139.199.59.31 attack
Oct 12 16:42:11 eventyay sshd[1177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.59.31
Oct 12 16:42:13 eventyay sshd[1177]: Failed password for invalid user Auto from 139.199.59.31 port 61389 ssh2
Oct 12 16:49:37 eventyay sshd[1328]: Failed password for root from 139.199.59.31 port 42494 ssh2
...
2019-10-13 03:42:50
14.215.129.156 attackspam
firewall-block, port(s): 445/tcp
2019-10-13 03:40:56

Recently Reported IPs

145.249.38.222 77.233.8.237 43.44.40.40 169.182.197.77
165.68.110.193 196.37.125.17 120.102.80.178 108.92.54.73
200.149.12.36 41.108.160.185 81.189.179.139 22.218.186.9
249.89.192.140 241.56.96.245 134.139.35.126 92.76.48.169
178.183.189.173 168.248.42.116 23.144.170.252 6.62.110.54