Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Porlezza

Region: Lombardy

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.149.246.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50118
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.149.246.22.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022072201 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 23 04:39:39 CST 2022
;; MSG SIZE  rcvd: 107
Host info
22.246.149.159.in-addr.arpa domain name pointer cln-246-22.eduroam.unimi.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
22.246.149.159.in-addr.arpa	name = cln-246-22.eduroam.unimi.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
140.143.16.248 attackbotsspam
k+ssh-bruteforce
2020-04-09 04:02:36
204.188.255.82 attack
445/tcp
[2020-04-08]1pkt
2020-04-09 04:21:40
178.128.203.189 attackspambots
Apr  8 20:05:15 work-partkepr sshd\[28760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.203.189  user=root
Apr  8 20:05:17 work-partkepr sshd\[28760\]: Failed password for root from 178.128.203.189 port 50796 ssh2
...
2020-04-09 04:05:14
180.76.105.165 attackbots
Apr  8 21:47:33 localhost sshd[25874]: Invalid user update from 180.76.105.165 port 59976
...
2020-04-09 04:08:52
109.61.51.231 attack
23/tcp
[2020-04-08]1pkt
2020-04-09 04:18:42
59.10.5.156 attackbots
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-04-09 03:58:41
220.133.135.207 attackspam
23/tcp
[2020-04-08]1pkt
2020-04-09 04:18:59
77.222.159.195 attackbots
2020-04-08T13:05:43.792405shield sshd\[10718\]: Invalid user brenda from 77.222.159.195 port 58334
2020-04-08T13:05:43.797019shield sshd\[10718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.222.159.195
2020-04-08T13:05:45.781229shield sshd\[10718\]: Failed password for invalid user brenda from 77.222.159.195 port 58334 ssh2
2020-04-08T13:09:58.585566shield sshd\[12030\]: Invalid user git from 77.222.159.195 port 43294
2020-04-08T13:09:58.590727shield sshd\[12030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.222.159.195
2020-04-09 04:17:04
106.12.193.97 attackbots
2020-04-08T19:48:21.459735  sshd[9556]: Invalid user popa3d from 106.12.193.97 port 39242
2020-04-08T19:48:21.474227  sshd[9556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.193.97
2020-04-08T19:48:21.459735  sshd[9556]: Invalid user popa3d from 106.12.193.97 port 39242
2020-04-08T19:48:23.490810  sshd[9556]: Failed password for invalid user popa3d from 106.12.193.97 port 39242 ssh2
...
2020-04-09 04:05:44
202.166.171.82 attackbots
1433/tcp 445/tcp
[2020-04-04/08]2pkt
2020-04-09 03:53:08
134.122.114.80 attackbots
2020-04-08T13:34:08Z - RDP login failed multiple times. (134.122.114.80)
2020-04-09 04:11:43
45.113.71.23 attackspambots
Unauthorized connection attempt detected from IP address 45.113.71.23 to port 1947 [T]
2020-04-09 03:50:01
159.89.131.172 attackbotsspam
Trolling for resource vulnerabilities
2020-04-09 03:59:03
82.213.229.176 attackbots
23/tcp
[2020-04-08]1pkt
2020-04-09 04:07:16
175.138.108.78 attackbotsspam
Apr  8 19:36:43 DAAP sshd[17436]: Invalid user admin from 175.138.108.78 port 41002
Apr  8 19:36:43 DAAP sshd[17436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.138.108.78
Apr  8 19:36:43 DAAP sshd[17436]: Invalid user admin from 175.138.108.78 port 41002
Apr  8 19:36:45 DAAP sshd[17436]: Failed password for invalid user admin from 175.138.108.78 port 41002 ssh2
Apr  8 19:40:16 DAAP sshd[17542]: Invalid user user from 175.138.108.78 port 32869
...
2020-04-09 04:13:38

Recently Reported IPs

159.15.200.7 159.149.50.132 159.149.86.174 159.149.10.4
159.148.43.163 159.149.68.144 159.148.76.242 159.149.99.245
159.149.175.64 159.149.85.42 159.149.124.5 159.149.159.8
159.149.105.33 159.148.166.26 159.148.33.123 159.148.45.43
159.148.41.64 159.148.214.206 159.148.167.0 159.148.89.240