Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.15.42.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64039
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;16.15.42.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 18:34:07 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 149.42.15.16.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.42.15.16.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.162.9.171 attack
Unauthorised access (Sep  9) SRC=222.162.9.171 LEN=40 TTL=46 ID=4485 TCP DPT=8080 WINDOW=11602 SYN
2020-09-11 03:54:28
189.57.229.5 attackbots
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.57.229.5
Invalid user salamanca from 189.57.229.5 port 58544
Failed password for invalid user salamanca from 189.57.229.5 port 58544 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.57.229.5  user=root
Failed password for root from 189.57.229.5 port 37620 ssh2
2020-09-11 04:30:35
139.255.89.2 attackbots
1599721257 - 09/10/2020 09:00:57 Host: 139.255.89.2/139.255.89.2 Port: 445 TCP Blocked
2020-09-11 04:12:31
182.61.59.163 attackbotsspam
182.61.59.163 (CN/China/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 10 08:55:35 server4 sshd[6635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.59.163  user=root
Sep 10 08:52:26 server4 sshd[5111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.216.238  user=root
Sep 10 08:52:29 server4 sshd[5111]: Failed password for root from 119.29.216.238 port 53174 ssh2
Sep 10 08:49:11 server4 sshd[3308]: Failed password for root from 107.170.178.103 port 39777 ssh2
Sep 10 08:54:50 server4 sshd[6152]: Failed password for root from 142.44.218.192 port 39734 ssh2
Sep 10 08:49:09 server4 sshd[3308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.178.103  user=root

IP Addresses Blocked:
2020-09-11 03:59:19
2.57.122.209 attackspambots
\[2020-09-10 21:40:58\] \[28845\] \[smtp_25_tcp 17346\] \[2.57.122.209:61136\] send: 250 2.6.0 Ok: queued as 17D4A395
2020-09-11 04:33:40
78.182.104.227 attack
Unauthorized connection attempt from IP address 78.182.104.227 on Port 445(SMB)
2020-09-11 03:55:23
152.92.200.71 attackspambots
Unauthorized connection attempt from IP address 152.92.200.71 on Port 445(SMB)
2020-09-11 03:54:17
188.254.0.182 attackbots
Sep 10 17:09:39 [host] sshd[28185]: pam_unix(sshd:
Sep 10 17:09:41 [host] sshd[28185]: Failed passwor
Sep 10 17:13:48 [host] sshd[28337]: pam_unix(sshd:
2020-09-11 03:53:22
172.98.193.62 attackspam
172.98.193.62 - - \[10/Sep/2020:18:36:44 +0200\] "GET /index.php\?id=ausland%22%29%29%2F%2A\&id=%2A%2FAS%2F%2A\&id=%2A%2FjrTb%2F%2A\&id=%2A%2FWHERE%2F%2A\&id=%2A%2F6653%3D6653%2F%2A\&id=%2A%2FOR%2F%2A\&id=%2A%2FNOT%2F%2A\&id=%2A%2F5335%3D1536--%2F%2A\&id=%2A%2FpVPA HTTP/1.1" 200 15500 "http://www.firma-lsf.eu:80/index.php" "Googlebot \(compatible  Googlebot/2.1   http://www.google.com/bot.html\)"
...
2020-09-11 03:56:18
192.42.116.15 attackbotsspam
192.42.116.15 - - \[10/Sep/2020:20:49:38 +0200\] "GET /index.php\?id=-2612%27%2F%2A\&id=%2A%2FOR%2F%2A\&id=%2A%2F%28SELECT%2F%2A\&id=%2A%2F%28CASE%2F%2A\&id=%2A%2FWHEN%2F%2A\&id=%2A%2F%282630%3D7308%29%2F%2A\&id=%2A%2FTHEN%2F%2A\&id=%2A%2FNULL%2F%2A\&id=%2A%2FELSE%2F%2A\&id=%2A%2FCAST%28%28CHR%28122%29%7C%7CCHR%28111%29%7C%7CCHR%2880%29%7C%7CCHR%2876%29%29%2F%2A\&id=%2A%2FAS%2F%2A\&id=%2A%2FNUMERIC%29%2F%2A\&id=%2A%2FEND%29%29%2F%2A\&id=%2A%2FIS%2F%2A\&id=%2A%2FNULL--%2F%2A\&id=%2A%2FgnfJ HTTP/1.1" 200 12305 "http://www.firma-lsf.eu:80/index.php" "Googlebot \(compatible  Googlebot/2.1   http://www.google.com/bot.html\)"
...
2020-09-11 04:28:33
202.86.172.66 attack
Unauthorized connection attempt from IP address 202.86.172.66 on Port 445(SMB)
2020-09-11 03:52:01
152.32.104.245 attackspam
Unauthorized connection attempt from IP address 152.32.104.245 on Port 445(SMB)
2020-09-11 03:52:45
103.25.4.80 attack
Attempted connection to port 445.
2020-09-11 04:17:26
36.7.142.146 attackbotsspam
Attempted connection to port 1433.
2020-09-11 04:04:37
190.204.156.226 attack
Unauthorized connection attempt from IP address 190.204.156.226 on Port 445(SMB)
2020-09-11 04:00:58

Recently Reported IPs

98.221.56.81 47.169.161.244 65.233.158.27 214.227.178.90
88.193.241.122 42.68.123.189 104.241.83.193 32.233.155.31
55.52.40.4 82.201.226.130 4.246.234.180 85.66.75.244
236.217.91.233 215.22.42.70 225.34.66.241 63.203.160.57
198.27.105.116 167.36.121.11 80.150.118.73 215.168.38.70