Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Ghana

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.166.200.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29229
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;154.166.200.149.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011200 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 12 20:57:20 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 149.200.166.154.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.200.166.154.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.230.152.175 attack
Invalid user unithkd from 111.230.152.175 port 47778
2019-08-23 21:09:30
31.208.65.235 attack
Aug 23 03:22:18 aiointranet sshd\[12128\]: Invalid user postgres from 31.208.65.235
Aug 23 03:22:18 aiointranet sshd\[12128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31-208-65-235.cust.bredband2.com
Aug 23 03:22:20 aiointranet sshd\[12128\]: Failed password for invalid user postgres from 31.208.65.235 port 34262 ssh2
Aug 23 03:26:29 aiointranet sshd\[12529\]: Invalid user pim from 31.208.65.235
Aug 23 03:26:29 aiointranet sshd\[12529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31-208-65-235.cust.bredband2.com
2019-08-23 21:41:03
187.32.219.229 attackbots
Invalid user admin from 187.32.219.229 port 53896
2019-08-23 20:40:55
61.6.244.144 attack
Invalid user admin from 61.6.244.144 port 37707
2019-08-23 21:23:33
189.7.121.28 attackspambots
Invalid user qhsupport from 189.7.121.28 port 32811
2019-08-23 20:39:30
37.114.146.57 attackbots
Invalid user admin from 37.114.146.57 port 60737
2019-08-23 21:37:25
103.21.218.242 attackbots
Invalid user kyle from 103.21.218.242 port 44220
2019-08-23 21:15:04
103.17.83.182 attackspambots
Invalid user admin1 from 103.17.83.182 port 14137
2019-08-23 21:15:28
125.27.56.192 attackspambots
Invalid user admin from 125.27.56.192 port 54127
2019-08-23 20:58:48
40.81.200.87 attack
Invalid user prueba01 from 40.81.200.87 port 55194
2019-08-23 21:35:12
110.184.163.213 attack
Invalid user admin from 110.184.163.213 port 43483
2019-08-23 21:10:47
159.226.5.101 attackbotsspam
Invalid user gemma from 159.226.5.101 port 50044
2019-08-23 20:49:55
37.204.99.75 attack
Invalid user admin from 37.204.99.75 port 41229
2019-08-23 21:36:16
181.49.102.190 attack
$f2bV_matches
2019-08-23 20:43:20
23.129.64.180 attack
Invalid user john from 23.129.64.180 port 32237
2019-08-23 21:45:42

Recently Reported IPs

144.251.15.221 247.71.31.154 209.63.162.148 215.63.45.242
34.120.176.59 52.154.153.91 241.153.184.55 147.209.187.147
251.237.136.231 137.183.174.5 63.220.26.11 116.105.175.178
50.215.185.181 91.111.185.94 139.65.206.150 44.45.110.158
143.21.62.18 110.35.244.201 187.125.81.80 246.2.242.119