Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.138.215.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20123
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;162.138.215.149.		IN	A

;; AUTHORITY SECTION:
.			298	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020500 1800 900 604800 86400

;; Query time: 116 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 22:38:22 CST 2020
;; MSG SIZE  rcvd: 119
Host info
Host 149.215.138.162.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.215.138.162.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
94.224.208.114 attackbots
Probing for app exploits
2020-04-23 00:16:37
148.233.37.49 attack
Unauthorized connection attempt from IP address 148.233.37.49 on Port 445(SMB)
2020-04-23 00:22:41
177.185.217.20 attackbotsspam
Lines containing failures of 177.185.217.20
Apr 22 13:55:53 shared01 sshd[25123]: Did not receive identification string from 177.185.217.20 port 62597
Apr 22 13:56:09 shared01 sshd[25138]: Invalid user guest from 177.185.217.20 port 64174
Apr 22 13:56:09 shared01 sshd[25138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.185.217.20
Apr 22 13:56:11 shared01 sshd[25138]: Failed password for invalid user guest from 177.185.217.20 port 64174 ssh2
Apr 22 13:56:11 shared01 sshd[25138]: Connection closed by invalid user guest 177.185.217.20 port 64174 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=177.185.217.20
2020-04-22 23:43:47
188.190.158.2 attackbotsspam
20/4/22@08:01:55: FAIL: Alarm-Network address from=188.190.158.2
20/4/22@08:01:55: FAIL: Alarm-Network address from=188.190.158.2
...
2020-04-23 00:02:18
14.248.83.163 attackbotsspam
Apr 22 15:02:58 ns381471 sshd[6172]: Failed password for gitlab from 14.248.83.163 port 46108 ssh2
2020-04-23 00:21:43
45.55.155.72 attack
2020-04-22T09:41:12.7622471495-001 sshd[37665]: Invalid user test123 from 45.55.155.72 port 21644
2020-04-22T09:41:14.7052581495-001 sshd[37665]: Failed password for invalid user test123 from 45.55.155.72 port 21644 ssh2
2020-04-22T09:44:58.0150461495-001 sshd[37841]: Invalid user admin from 45.55.155.72 port 54695
2020-04-22T09:44:58.0219911495-001 sshd[37841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.155.72
2020-04-22T09:44:58.0150461495-001 sshd[37841]: Invalid user admin from 45.55.155.72 port 54695
2020-04-22T09:44:59.6464901495-001 sshd[37841]: Failed password for invalid user admin from 45.55.155.72 port 54695 ssh2
...
2020-04-22 23:52:56
222.186.15.158 attack
Apr 22 17:49:27 plex sshd[27142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root
Apr 22 17:49:29 plex sshd[27142]: Failed password for root from 222.186.15.158 port 35922 ssh2
2020-04-22 23:51:41
213.6.141.146 attackspambots
Unauthorized IMAP connection attempt
2020-04-23 00:26:35
103.137.70.6 attackbotsspam
20/4/22@08:01:50: FAIL: Alarm-SSH address from=103.137.70.6
...
2020-04-23 00:06:12
222.186.52.39 attackspambots
Apr 22 12:54:52 firewall sshd[7980]: Failed password for root from 222.186.52.39 port 40596 ssh2
Apr 22 12:54:55 firewall sshd[7980]: Failed password for root from 222.186.52.39 port 40596 ssh2
Apr 22 12:55:00 firewall sshd[7980]: Failed password for root from 222.186.52.39 port 40596 ssh2
...
2020-04-23 00:01:17
103.242.56.183 attackbots
Apr 22 17:43:03 server sshd[22411]: Failed password for root from 103.242.56.183 port 39098 ssh2
Apr 22 17:45:21 server sshd[22682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.242.56.183
Apr 22 17:45:22 server sshd[22682]: Failed password for invalid user ma from 103.242.56.183 port 53989 ssh2
...
2020-04-22 23:54:06
171.245.48.27 attackspam
Unauthorized connection attempt from IP address 171.245.48.27 on Port 445(SMB)
2020-04-22 23:50:02
119.73.165.210 attackspambots
Unauthorized connection attempt from IP address 119.73.165.210 on Port 445(SMB)
2020-04-22 23:47:46
188.225.33.71 attack
188.225.33.71 has been banned for [WebApp Attack]
...
2020-04-23 00:19:05
37.114.26.3 attack
Unauthorized connection attempt from IP address 37.114.26.3 on Port 445(SMB)
2020-04-23 00:05:24

Recently Reported IPs

188.212.172.63 226.164.194.21 32.230.14.69 15.206.20.66
110.78.226.34 188.166.61.169 77.47.20.215 59.42.39.146
54.213.133.161 159.226.170.18 47.30.143.86 161.117.178.197
86.5.202.153 181.123.85.106 66.249.65.223 14.186.198.64
3.14.146.193 175.196.4.221 91.77.165.18 122.51.56.227