Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Vigo

Region: Comunidad Autónoma de Galicia

Country: Spain

Internet Service Provider: Vodafone

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.147.66.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16605
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.147.66.149.			IN	A

;; AUTHORITY SECTION:
.			553	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022072201 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 23 05:15:47 CST 2022
;; MSG SIZE  rcvd: 107
Host info
149.66.147.159.in-addr.arpa domain name pointer 159-147-66-149.red-acceso.airtel.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.66.147.159.in-addr.arpa	name = 159-147-66-149.red-acceso.airtel.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.112.167.134 attackspambots
Nov 15 06:40:16 venus sshd\[2355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.112.167.134  user=root
Nov 15 06:40:17 venus sshd\[2355\]: Failed password for root from 103.112.167.134 port 46776 ssh2
Nov 15 06:44:50 venus sshd\[2419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.112.167.134  user=www-data
...
2019-11-15 17:23:11
216.218.206.111 attack
firewall-block, port(s): 111/udp
2019-11-15 17:27:41
167.71.214.37 attackbots
Nov 15 08:29:19 MK-Soft-VM6 sshd[10207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.214.37 
Nov 15 08:29:21 MK-Soft-VM6 sshd[10207]: Failed password for invalid user galuba from 167.71.214.37 port 60536 ssh2
...
2019-11-15 17:48:49
95.10.206.159 attack
Port 1433 Scan
2019-11-15 17:50:29
175.150.50.237 attackbots
Unauthorised access (Nov 15) SRC=175.150.50.237 LEN=40 TTL=111 ID=30454 TCP DPT=8080 WINDOW=29758 SYN
2019-11-15 17:31:05
206.183.108.195 attackspambots
port scan and connect, tcp 1433 (ms-sql-s)
2019-11-15 17:27:57
213.230.96.243 attack
WordPress login Brute force / Web App Attack on client site.
2019-11-15 17:39:24
90.127.254.108 attack
no
2019-11-15 17:27:16
162.247.74.7 attack
Automatic report - XMLRPC Attack
2019-11-15 17:24:19
49.88.112.115 attackbots
Nov 14 20:21:29 php1 sshd\[16636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115  user=root
Nov 14 20:21:31 php1 sshd\[16636\]: Failed password for root from 49.88.112.115 port 10800 ssh2
Nov 14 20:21:49 php1 sshd\[16646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115  user=root
Nov 14 20:21:51 php1 sshd\[16646\]: Failed password for root from 49.88.112.115 port 63852 ssh2
Nov 14 20:26:18 php1 sshd\[17514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115  user=root
2019-11-15 17:37:26
112.85.42.185 attack
$f2bV_matches
2019-11-15 17:20:09
210.217.24.230 attackbots
Nov 15 08:07:30 icinga sshd[16660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.217.24.230 
Nov 15 08:07:32 icinga sshd[16660]: Failed password for invalid user hp from 210.217.24.230 port 58432 ssh2
Nov 15 08:43:41 icinga sshd[50256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.217.24.230 
...
2019-11-15 17:51:32
112.85.42.227 attack
Nov 15 04:10:54 TORMINT sshd\[21575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227  user=root
Nov 15 04:10:56 TORMINT sshd\[21575\]: Failed password for root from 112.85.42.227 port 32170 ssh2
Nov 15 04:12:54 TORMINT sshd\[21658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227  user=root
...
2019-11-15 17:35:14
110.182.96.5 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/110.182.96.5/ 
 
 CN - 1H : (937)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4134 
 
 IP : 110.182.96.5 
 
 CIDR : 110.176.0.0/13 
 
 PREFIX COUNT : 5430 
 
 UNIQUE IP COUNT : 106919680 
 
 
 ATTACKS DETECTED ASN4134 :  
  1H - 21 
  3H - 50 
  6H - 118 
 12H - 196 
 24H - 438 
 
 DateTime : 2019-11-15 07:26:42 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-15 17:21:04
124.153.75.18 attack
Lines containing failures of 124.153.75.18 (max 1000)
Nov 11 03:22:42 localhost sshd[9701]: Invalid user mniece from 124.153.75.18 port 42458
Nov 11 03:22:42 localhost sshd[9701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.153.75.18 
Nov 11 03:22:43 localhost sshd[9701]: Failed password for invalid user mniece from 124.153.75.18 port 42458 ssh2
Nov 11 03:22:44 localhost sshd[9701]: Received disconnect from 124.153.75.18 port 42458:11: Bye Bye [preauth]
Nov 11 03:22:44 localhost sshd[9701]: Disconnected from invalid user mniece 124.153.75.18 port 42458 [preauth]
Nov 11 03:35:11 localhost sshd[15380]: Invalid user admin from 124.153.75.18 port 56198
Nov 11 03:35:11 localhost sshd[15380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.153.75.18 
Nov 11 03:35:13 localhost sshd[15380]: Failed password for invalid user admin from 124.153.75.18 port 56198 ssh2
Nov 11 03:35:14 localhost........
------------------------------
2019-11-15 17:40:06

Recently Reported IPs

159.145.44.153 159.146.186.159 159.143.219.191 159.144.236.79
159.143.82.139 159.143.172.151 159.143.9.25 159.143.96.31
159.143.189.7 159.144.18.141 159.144.146.43 159.144.90.30
159.143.197.83 159.144.237.168 42.18.92.53 159.144.162.224
159.144.99.35 159.143.87.66 159.144.184.71 159.143.184.62