Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Pavia

Region: Lombardy

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.149.245.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14097
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.149.245.1.			IN	A

;; AUTHORITY SECTION:
.			51	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022072201 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 23 04:30:42 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 1.245.149.159.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 1.245.149.159.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
77.121.92.243 attackbotsspam
RDP Bruteforce
2020-09-21 16:55:02
27.210.134.69 attackbots
firewall-block, port(s): 8082/udp
2020-09-21 16:40:58
212.200.196.147 attackspambots
RDP Brute-Force (honeypot 14)
2020-09-21 17:05:30
46.148.214.133 attackspam
Sep 20 15:00:19 scw-focused-cartwright sshd[20815]: Failed password for root from 46.148.214.133 port 48960 ssh2
Sep 20 17:00:07 scw-focused-cartwright sshd[23156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.148.214.133
2020-09-21 16:50:22
156.96.128.222 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-09-21 16:46:02
185.175.93.104 attack
 TCP (SYN) 185.175.93.104:49389 -> port 8080, len 40
2020-09-21 16:35:32
185.176.27.34 attack
 TCP (SYN) 185.176.27.34:48183 -> port 17596, len 44
2020-09-21 16:29:53
87.251.75.8 attackbots
RDP Bruteforce
2020-09-21 16:54:41
192.241.219.38 attackspam
Hits on port : 22
2020-09-21 16:28:45
182.121.135.46 attackspambots
Listed on    zen-spamhaus also abuseat.org   / proto=6  .  srcport=31583  .  dstport=23  .     (2308)
2020-09-21 17:09:47
185.234.218.39 attackspam
RDP Bruteforce
2020-09-21 16:52:05
103.199.136.48 attack
Unauthorized connection attempt from IP address 103.199.136.48 on Port 445(SMB)
2020-09-21 16:36:24
185.175.93.14 attackbots
Port-scan: detected 112 distinct ports within a 24-hour window.
2020-09-21 16:38:08
27.72.124.32 attack
Unauthorized connection attempt from IP address 27.72.124.32 on Port 445(SMB)
2020-09-21 16:31:51
74.112.137.71 attackbots
$f2bV_matches
2020-09-21 17:06:45

Recently Reported IPs

159.149.234.195 159.150.173.181 159.149.58.99 159.15.248.207
159.15.209.103 159.149.61.197 159.15.213.148 159.15.140.184
159.15.115.110 159.15.149.16 159.15.171.25 159.149.243.113
159.149.194.193 159.15.164.25 159.149.129.250 159.15.255.86
159.15.211.117 159.15.182.233 159.15.124.167 159.15.227.13