Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Munich

Region: Bavaria

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.135.149.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61243
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;159.135.149.222.		IN	A

;; AUTHORITY SECTION:
.			248	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020050101 1800 900 604800 86400

;; Query time: 122 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 01 23:55:40 CST 2020
;; MSG SIZE  rcvd: 119
Host info
Host 222.149.135.159.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 222.149.135.159.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.38.34.142 attack
Mar 13 13:42:27 meumeu sshd[26349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.34.142 
Mar 13 13:42:28 meumeu sshd[26349]: Failed password for invalid user ankur from 51.38.34.142 port 54635 ssh2
Mar 13 13:46:21 meumeu sshd[26930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.34.142 
...
2020-03-13 22:38:24
151.80.144.39 attackbots
Mar 13 15:26:22 lnxweb61 sshd[11505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.144.39
2020-03-13 22:34:44
220.235.95.226 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/220.235.95.226/ 
 
 AU - 1H : (26)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : AU 
 NAME ASN : ASN4739 
 
 IP : 220.235.95.226 
 
 CIDR : 220.235.64.0/18 
 
 PREFIX COUNT : 707 
 
 UNIQUE IP COUNT : 1283584 
 
 
 ATTACKS DETECTED ASN4739 :  
  1H - 1 
  3H - 2 
  6H - 2 
 12H - 2 
 24H - 2 
 
 DateTime : 2020-03-13 13:48:01 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-03-13 22:27:48
51.79.66.142 attack
frenzy
2020-03-13 22:35:34
82.178.60.165 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-13 23:11:07
109.73.14.251 attackbotsspam
1584103659 - 03/13/2020 13:47:39 Host: 109.73.14.251/109.73.14.251 Port: 445 TCP Blocked
2020-03-13 23:08:09
151.80.254.78 attackbots
Feb 16 09:20:34 pi sshd[14619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.254.78 
Feb 16 09:20:35 pi sshd[14619]: Failed password for invalid user insideout from 151.80.254.78 port 35792 ssh2
2020-03-13 22:30:25
151.239.31.210 attackbotsspam
Jan  8 07:47:34 pi sshd[5855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.239.31.210 
Jan  8 07:47:36 pi sshd[5855]: Failed password for invalid user operator from 151.239.31.210 port 35089 ssh2
2020-03-13 22:41:38
170.246.24.47 attackbots
Automatic report - Port Scan Attack
2020-03-13 23:00:41
150.95.147.216 attackspam
Jan 15 19:04:29 pi sshd[31117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.147.216 
Jan 15 19:04:31 pi sshd[31117]: Failed password for invalid user robot from 150.95.147.216 port 33144 ssh2
2020-03-13 22:51:01
45.125.65.42 attack
2020-03-13T09:03:07.415099linuxbox-skyline auth[22172]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=archive rhost=45.125.65.42
...
2020-03-13 23:05:54
193.112.253.27 attackbotsspam
Mar 13 15:06:54 santamaria sshd\[6279\]: Invalid user mailman from 193.112.253.27
Mar 13 15:06:54 santamaria sshd\[6279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.253.27
Mar 13 15:06:55 santamaria sshd\[6279\]: Failed password for invalid user mailman from 193.112.253.27 port 55436 ssh2
...
2020-03-13 22:38:52
212.156.59.222 attackspambots
1584103660 - 03/13/2020 13:47:40 Host: 212.156.59.222/212.156.59.222 Port: 445 TCP Blocked
2020-03-13 23:06:37
68.183.19.26 attackspambots
$f2bV_matches
2020-03-13 22:55:49
87.250.224.72 attackspambots
[Fri Mar 13 19:47:36.050004 2020] [:error] [pid 21295:tid 140257727084288] [client 87.250.224.72:53575] [client 87.250.224.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "XmuA6D9QqO5Ca32m832UxwAAAmA"]
...
2020-03-13 23:10:45

Recently Reported IPs

121.141.47.68 42.115.165.92 90.31.243.234 20.119.102.229
213.200.200.56 98.138.20.54 73.89.229.197 27.41.190.26
72.182.135.132 18.29.98.122 97.234.163.128 112.12.121.120
55.190.192.124 99.244.210.182 199.195.57.203 65.22.30.186
223.191.50.63 39.210.22.8 185.10.68.71 112.112.8.196