Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
157.245.149.219 attackbotsspam
157.245.149.219 - - [07/May/2020:16:59:51 +0200] "GET /wp-login.php HTTP/1.1" 200 5702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.149.219 - - [07/May/2020:16:59:53 +0200] "POST /wp-login.php HTTP/1.1" 200 5953 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.149.219 - - [07/May/2020:16:59:54 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-08 01:17:37
157.245.149.127 attack
$f2bV_matches
2020-04-21 03:08:58
157.245.149.219 attackspambots
157.245.149.219 - - [10/Apr/2020:10:23:21 +0200] "GET /wp-login.php HTTP/1.1" 200 6463 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.149.219 - - [10/Apr/2020:10:23:23 +0200] "POST /wp-login.php HTTP/1.1" 200 7362 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.149.219 - - [10/Apr/2020:10:23:25 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-10 17:14:16
157.245.149.219 attack
CMS (WordPress or Joomla) login attempt.
2020-04-05 13:08:26
157.245.149.219 attackspambots
Automatic report - XMLRPC Attack
2020-02-27 06:22:26
157.245.149.5 attackspam
Feb 11 10:03:14 v22018076622670303 sshd\[29636\]: Invalid user yrd from 157.245.149.5 port 55568
Feb 11 10:03:14 v22018076622670303 sshd\[29636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.149.5
Feb 11 10:03:16 v22018076622670303 sshd\[29636\]: Failed password for invalid user yrd from 157.245.149.5 port 55568 ssh2
...
2020-02-11 17:39:03
157.245.149.110 attackbots
Feb  3 02:42:37 firewall sshd[23656]: Failed password for invalid user foswiki from 157.245.149.110 port 45478 ssh2
Feb  3 02:45:57 firewall sshd[23787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.149.110  user=root
Feb  3 02:45:59 firewall sshd[23787]: Failed password for root from 157.245.149.110 port 53094 ssh2
...
2020-02-03 14:41:38
157.245.149.110 attackspam
$f2bV_matches
2020-02-02 19:28:13
157.245.149.241 attackspam
RDP Bruteforce
2020-01-29 16:09:40
157.245.149.5 attack
$f2bV_matches
2020-01-26 02:59:12
157.245.149.5 attackspam
Unauthorized connection attempt detected from IP address 157.245.149.5 to port 2220 [J]
2020-01-25 15:14:43
157.245.149.5 attackbotsspam
Jan 22 23:48:42 hcbbdb sshd\[31125\]: Invalid user alejandro from 157.245.149.5
Jan 22 23:48:42 hcbbdb sshd\[31125\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.149.5
Jan 22 23:48:44 hcbbdb sshd\[31125\]: Failed password for invalid user alejandro from 157.245.149.5 port 53226 ssh2
Jan 22 23:50:59 hcbbdb sshd\[31468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.149.5  user=root
Jan 22 23:51:01 hcbbdb sshd\[31468\]: Failed password for root from 157.245.149.5 port 45358 ssh2
2020-01-23 08:16:00
157.245.149.5 attackspambots
Unauthorized connection attempt detected from IP address 157.245.149.5 to port 2220 [J]
2020-01-22 05:23:50
157.245.149.93 attackbots
xmlrpc attack
2019-12-04 13:14:35
157.245.149.124 attackbots
Nov  5 17:37:28 icinga sshd[24535]: Failed password for root from 157.245.149.124 port 59272 ssh2
Nov  5 17:42:02 icinga sshd[25018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.149.124
...
2019-11-06 04:06:08
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.245.149.25
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16997
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.245.149.25.			IN	A

;; AUTHORITY SECTION:
.			225	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 19:13:43 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 25.149.245.157.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 25.149.245.157.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.166.104.121 attackspambots
firewall-block, port(s): 8291/tcp
2020-03-10 19:31:15
79.140.180.40 attackbotsspam
Brute forcing RDP port 3389
2020-03-10 19:27:41
193.56.28.188 attack
Mar 10 12:04:17 karger postfix/smtpd[29633]: warning: unknown[193.56.28.188]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 12:04:23 karger postfix/smtpd[29633]: warning: unknown[193.56.28.188]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 12:04:33 karger postfix/smtpd[29633]: warning: unknown[193.56.28.188]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-03-10 19:57:22
170.233.122.254 attack
Automatic report - Port Scan Attack
2020-03-10 19:33:18
46.161.58.67 attackspambots
B: Magento admin pass test (wrong country)
2020-03-10 19:57:37
80.211.30.166 attack
Mar 10 10:55:40 ns381471 sshd[4998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.30.166
Mar 10 10:55:42 ns381471 sshd[4998]: Failed password for invalid user mc from 80.211.30.166 port 40952 ssh2
2020-03-10 20:04:42
92.118.38.58 attack
Mar 10 12:21:31 mail.srvfarm.net postfix/smtpd[490396]: warning: unknown[92.118.38.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 12:22:01 mail.srvfarm.net postfix/smtpd[489231]: warning: unknown[92.118.38.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 12:22:31 mail.srvfarm.net postfix/smtpd[508924]: warning: unknown[92.118.38.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 12:23:01 mail.srvfarm.net postfix/smtpd[508926]: warning: unknown[92.118.38.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 12:23:38 mail.srvfarm.net postfix/smtpd[508926]: warning: unknown[92.118.38.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-03-10 19:27:19
156.96.116.43 spamattack
Mar 10 10:50:59 ... postfix/postscreen[...]: PREGREET 14 after 0.11 from [156.96.116.23]:59493: EHLO ylmf-pc\\r\\n
Mar 10 10:50:59 ... postfix/postscreen[...]: DISCONNECT [156.96.116.23]:59493
Mar 10 10:51:00 ... postfix/postscreen[...]: CONNECT from [156.96.116.23]:60090 to ['ipadress']:25
Mar 10 10:51:00 ... postfix/postscreen[...]: PREGREET 14 after 0.11 from [156.96.116.23]:60090: EHLO ylmf-pc\\r\\n
Mar 10 10:51:00 ... postfix/postscreen[...]: DISCONNECT [156.96.116.23]:60090
Mar 10 10:51:00 ... postfix/postscreen[...]: CONNECT from [156.96.116.23]:60482 to ['ipadress']:25
Mar 10 10:51:00 ... postfix/postscreen[...]: PREGREET 14 after 0.11 from [156.96.116.23]:60482: EHLO ylmf-pc\\r\\n
Mar 10 10:51:00 ... postfix/postscreen[...]: DISCONNECT [156.96.116.23]:60482
Mar 10 10:51:00 ... postfix/postscreen[...]: CONNECT from [156.96.116.23]:60921 to ['ipadress']:25
Mar 10 10:51:00 ... postfix/postscreen[...]: PREGREET 14 after 0.12 from [156.96.116.23]:60921: EHLO ylmf-pc\\r\\n
Mar 10 10:51:00 ... postfix/postscreen[...]: DISCONNECT [156.96.116.23]:60921
Mar 10 10:51:01 ... postfix/postscreen[...]: CONNECT from [156.96.116.23]:65535 to ['ipadress']:25
Mar 10 10:51:01 ... postfix/postscreen[...]: PREGREET 14 after 0.11 from [156.96.116.23]:65535: EHLO ylmf-pc\\r\\n
Mar 10 10:51:01 ... postfix/postscreen[...]: DISCONNECT [156.96.116.23]:65535
Mar 10 10:51:01 ... postfix/postscreen[...]: CONNECT from [156.96.116.23]:54657 to ['ipadress']:25
Mar 10 10:51:01 ... postfix/postscreen[...]: PREGREET 14 after 0.11 from [156.96.116.23]:54657: EHLO ylmf-pc\\r\\n
2020-03-10 19:27:25
139.199.228.133 attackspambots
Mar 10 08:41:10 marvibiene sshd[1568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.228.133  user=root
Mar 10 08:41:11 marvibiene sshd[1568]: Failed password for root from 139.199.228.133 port 16731 ssh2
Mar 10 09:25:15 marvibiene sshd[2074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.228.133  user=root
Mar 10 09:25:17 marvibiene sshd[2074]: Failed password for root from 139.199.228.133 port 62367 ssh2
...
2020-03-10 20:00:11
103.139.243.158 attack
Automatic report - Port Scan Attack
2020-03-10 19:55:35
61.140.163.75 attackbotsspam
Lines containing failures of 61.140.163.75
Mar  9 06:48:29 shared09 sshd[30068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.140.163.75  user=r.r
Mar  9 06:48:31 shared09 sshd[30068]: Failed password for r.r from 61.140.163.75 port 36030 ssh2
Mar  9 06:48:32 shared09 sshd[30068]: Received disconnect from 61.140.163.75 port 36030:11: Bye Bye [preauth]
Mar  9 06:48:32 shared09 sshd[30068]: Disconnected from authenticating user r.r 61.140.163.75 port 36030 [preauth]
Mar  9 06:53:45 shared09 sshd[31510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.140.163.75  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=61.140.163.75
2020-03-10 19:21:51
178.171.31.14 attackspam
Chat Spam
2020-03-10 19:47:14
144.91.107.87 attack
F2B blocked SSH BF
2020-03-10 20:06:16
79.138.8.251 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-10 19:25:46
51.68.220.249 attack
DATE:2020-03-10 12:34:16, IP:51.68.220.249, PORT:ssh SSH brute force auth (docker-dc)
2020-03-10 19:38:53

Recently Reported IPs

157.245.146.89 157.245.147.15 157.245.165.95 157.245.15.235
157.245.147.133 157.245.162.5 157.245.161.149 157.245.157.211
157.245.163.71 157.245.166.133 157.245.166.214 157.245.169.61
157.245.147.254 157.245.174.158 157.245.176.10 157.245.175.138
157.245.172.33 157.245.171.167 157.245.176.250 157.245.183.168