Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.132.149.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37800
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;16.132.149.201.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:30:32 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 201.149.132.16.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 201.149.132.16.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.59.37.69 attackspam
Invalid user app from 37.59.37.69 port 47793
2020-09-26 07:04:02
113.21.228.202 attackbotsspam
Brute force blocker - service: proftpd1 - aantal: 69 - Sun Sep  2 05:30:17 2018
2020-09-26 06:57:51
52.150.8.43 attack
2020-09-24 UTC: (3x) - root(3x)
2020-09-26 06:56:11
37.114.173.14 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-26 07:06:08
94.232.136.126 attackbots
Sep 25 23:21:42 vps639187 sshd\[18848\]: Invalid user registry from 94.232.136.126 port 9438
Sep 25 23:21:42 vps639187 sshd\[18848\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.232.136.126
Sep 25 23:21:43 vps639187 sshd\[18848\]: Failed password for invalid user registry from 94.232.136.126 port 9438 ssh2
...
2020-09-26 07:07:23
194.87.139.223 attackspam
Invalid user fctrserver from 194.87.139.223 port 57674
2020-09-26 07:00:27
190.24.56.195 attackspambots
 TCP (SYN) 190.24.56.195:22082 -> port 8080, len 44
2020-09-26 06:57:18
138.197.217.164 attackbotsspam
Sep 26 01:04:37 * sshd[30361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.217.164
Sep 26 01:04:39 * sshd[30361]: Failed password for invalid user Guest from 138.197.217.164 port 47290 ssh2
2020-09-26 07:10:05
51.15.179.65 attackbots
Sep 25 21:47:33 scw-focused-cartwright sshd[3858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.179.65
Sep 25 21:47:34 scw-focused-cartwright sshd[3858]: Failed password for invalid user viktor from 51.15.179.65 port 39746 ssh2
2020-09-26 07:07:55
52.187.174.231 attack
Sep 25 20:00:24 *hidden* sshd[44092]: Failed password for invalid user arpan from 52.187.174.231 port 44296 ssh2 Sep 26 00:01:03 *hidden* sshd[2006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.187.174.231 user=root Sep 26 00:01:05 *hidden* sshd[2006]: Failed password for *hidden* from 52.187.174.231 port 40122 ssh2
2020-09-26 06:53:40
117.50.107.175 attackspam
SSH Invalid Login
2020-09-26 06:55:14
198.199.120.109 attackbots
Invalid user desliga from 198.199.120.109 port 33874
2020-09-26 06:45:28
219.142.14.126 attack
Icarus honeypot on github
2020-09-26 06:54:36
189.152.47.1 attackspam
Icarus honeypot on github
2020-09-26 07:09:20
52.230.7.48 attack
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "173" at 2020-09-25T21:36:27Z
2020-09-26 06:35:31

Recently Reported IPs

17.157.58.117 190.66.24.45 247.114.27.108 42.69.181.128
175.251.13.249 169.49.226.210 243.54.93.76 22.225.10.134
87.0.67.42 27.133.119.211 248.41.215.130 144.51.202.68
252.74.56.83 144.34.87.9 192.203.151.245 219.237.111.247
156.153.2.110 122.76.249.147 40.153.58.219 43.135.102.234