Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.99.68.170
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64388
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.99.68.170.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:51:05 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 170.68.99.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 170.68.99.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.15.82.83 attackbots
2019-10-20T20:59:05.943842shield sshd\[30986\]: Invalid user sa123344 from 122.15.82.83 port 33194
2019-10-20T20:59:05.949600shield sshd\[30986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.15.82.83
2019-10-20T20:59:07.562291shield sshd\[30986\]: Failed password for invalid user sa123344 from 122.15.82.83 port 33194 ssh2
2019-10-20T21:03:42.078763shield sshd\[31744\]: Invalid user proxy from 122.15.82.83 port 42344
2019-10-20T21:03:42.082998shield sshd\[31744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.15.82.83
2019-10-21 05:15:05
157.245.230.224 attackspambots
157.245.230.224 - - [21/Oct/2019:00:28:04 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2019-10-21 04:47:46
202.164.48.202 attack
Oct 20 22:06:00 nextcloud sshd\[5579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.164.48.202  user=root
Oct 20 22:06:02 nextcloud sshd\[5579\]: Failed password for root from 202.164.48.202 port 46359 ssh2
Oct 20 22:27:22 nextcloud sshd\[12346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.164.48.202  user=root
...
2019-10-21 05:15:39
159.203.182.127 attack
Oct 21 02:23:19 areeb-Workstation sshd[7489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.182.127
Oct 21 02:23:20 areeb-Workstation sshd[7489]: Failed password for invalid user angela from 159.203.182.127 port 42116 ssh2
...
2019-10-21 05:00:07
43.242.212.81 attackbotsspam
Oct 20 22:28:05 lnxmysql61 sshd[15632]: Failed password for root from 43.242.212.81 port 41105 ssh2
Oct 20 22:28:05 lnxmysql61 sshd[15632]: Failed password for root from 43.242.212.81 port 41105 ssh2
2019-10-21 04:45:54
193.188.22.188 attack
2019-10-20T20:28:07.855018abusebot-8.cloudsearch.cf sshd\[14265\]: Invalid user helpdesk from 193.188.22.188 port 18792
2019-10-21 04:45:21
159.65.155.227 attackspam
2019-10-20T15:06:39.8440101495-001 sshd\[39141\]: Failed password for root from 159.65.155.227 port 42328 ssh2
2019-10-20T16:09:31.1010831495-001 sshd\[41538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.155.227  user=root
2019-10-20T16:09:32.7696461495-001 sshd\[41538\]: Failed password for root from 159.65.155.227 port 33858 ssh2
2019-10-20T16:13:39.1064971495-001 sshd\[41670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.155.227  user=root
2019-10-20T16:13:41.4878091495-001 sshd\[41670\]: Failed password for root from 159.65.155.227 port 44576 ssh2
2019-10-20T16:17:55.1229881495-001 sshd\[41796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.155.227  user=root
...
2019-10-21 05:04:36
107.189.1.219 attackbotsspam
xmlrpc attack
2019-10-21 04:56:28
189.4.124.74 attack
" "
2019-10-21 05:05:28
188.130.5.178 attackbots
Oct 20 23:12:12 ns381471 sshd[9168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.130.5.178
Oct 20 23:12:14 ns381471 sshd[9168]: Failed password for invalid user hkj from 188.130.5.178 port 36262 ssh2
Oct 20 23:16:19 ns381471 sshd[9272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.130.5.178
2019-10-21 05:17:14
107.175.214.83 attack
Honeypot attack, port: 445, PTR: 107-175-214-83-host.colocrossing.com.
2019-10-21 05:06:04
89.248.174.206 attack
Honeypot attack, port: 5555, PTR: PTR record not found
2019-10-21 05:08:55
181.118.94.57 attackspambots
2019-10-20T20:27:53.316453abusebot-7.cloudsearch.cf sshd\[25345\]: Invalid user admin from 181.118.94.57 port 46058
2019-10-21 04:55:49
31.185.104.19 attack
Oct 20 22:27:21 rotator sshd\[28470\]: Failed password for root from 31.185.104.19 port 34259 ssh2Oct 20 22:27:23 rotator sshd\[28470\]: Failed password for root from 31.185.104.19 port 34259 ssh2Oct 20 22:27:26 rotator sshd\[28470\]: Failed password for root from 31.185.104.19 port 34259 ssh2Oct 20 22:27:28 rotator sshd\[28470\]: Failed password for root from 31.185.104.19 port 34259 ssh2Oct 20 22:27:30 rotator sshd\[28470\]: Failed password for root from 31.185.104.19 port 34259 ssh2Oct 20 22:27:32 rotator sshd\[28470\]: Failed password for root from 31.185.104.19 port 34259 ssh2
...
2019-10-21 05:11:07
140.249.192.87 attackspambots
Oct 20 11:00:41 hanapaa sshd\[12048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.192.87  user=root
Oct 20 11:00:43 hanapaa sshd\[12048\]: Failed password for root from 140.249.192.87 port 35072 ssh2
Oct 20 11:04:54 hanapaa sshd\[12401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.192.87  user=root
Oct 20 11:04:57 hanapaa sshd\[12401\]: Failed password for root from 140.249.192.87 port 53548 ssh2
Oct 20 11:09:02 hanapaa sshd\[12761\]: Invalid user ram from 140.249.192.87
2019-10-21 05:16:43

Recently Reported IPs

9.137.225.41 156.172.48.227 16.242.253.116 255.184.94.110
45.33.35.141 134.61.181.191 248.104.182.202 64.120.41.230
167.63.13.172 187.4.109.156 251.194.159.210 27.229.115.10
36.23.148.164 137.45.176.221 103.155.30.198 165.163.157.111
250.220.223.232 59.46.57.47 38.127.106.124 192.101.247.209