Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: North Charleston

Region: South Carolina

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
162.216.149.24 attack
Malicious IP
2024-05-09 23:13:24
162.216.149.158 attack
Malicious IP
2024-04-20 13:03:27
162.216.149.192 attack
Malicious IP / Malware
2024-04-13 01:54:06
162.216.149.74 proxy
VPN fraud
2023-06-08 13:32:58
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.216.149.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61583
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;162.216.149.149.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026011800 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 19 02:30:04 CST 2026
;; MSG SIZE  rcvd: 108
Host info
149.149.216.162.in-addr.arpa domain name pointer 149.149.216.162.bc.googleusercontent.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.149.216.162.in-addr.arpa	name = 149.149.216.162.bc.googleusercontent.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
117.69.189.121 attackbots
Jul 25 07:49:54 srv01 postfix/smtpd\[24906\]: warning: unknown\[117.69.189.121\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 25 07:53:27 srv01 postfix/smtpd\[24906\]: warning: unknown\[117.69.189.121\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 25 07:57:02 srv01 postfix/smtpd\[25731\]: warning: unknown\[117.69.189.121\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 25 07:57:14 srv01 postfix/smtpd\[25731\]: warning: unknown\[117.69.189.121\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 25 07:57:31 srv01 postfix/smtpd\[25731\]: warning: unknown\[117.69.189.121\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-25 16:23:04
106.13.48.122 attack
Unauthorized connection attempt detected from IP address 106.13.48.122 to port 8812
2020-07-25 16:06:07
92.222.79.157 attackbots
$f2bV_matches
2020-07-25 16:05:40
183.111.204.148 attackspam
Jul 25 06:44:23 eventyay sshd[19265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.204.148
Jul 25 06:44:25 eventyay sshd[19265]: Failed password for invalid user u1 from 183.111.204.148 port 35068 ssh2
Jul 25 06:46:35 eventyay sshd[19328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.204.148
...
2020-07-25 16:33:04
182.61.40.214 attack
Invalid user solen from 182.61.40.214 port 36940
2020-07-25 16:45:56
140.238.25.151 attack
Jul 25 10:40:30 ip106 sshd[29642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.238.25.151 
Jul 25 10:40:31 ip106 sshd[29642]: Failed password for invalid user support from 140.238.25.151 port 42938 ssh2
...
2020-07-25 16:46:17
46.229.168.130 attackbotsspam
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2020-07-25 16:27:08
221.220.56.143 attackbotsspam
Jul 25 00:15:51 server1 sshd\[3642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.220.56.143 
Jul 25 00:15:52 server1 sshd\[3642\]: Failed password for invalid user flume from 221.220.56.143 port 54768 ssh2
Jul 25 00:20:40 server1 sshd\[5096\]: Invalid user hcz from 221.220.56.143
Jul 25 00:20:40 server1 sshd\[5096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.220.56.143 
Jul 25 00:20:41 server1 sshd\[5096\]: Failed password for invalid user hcz from 221.220.56.143 port 58546 ssh2
...
2020-07-25 16:39:47
116.21.24.101 attackbots
$f2bV_matches
2020-07-25 16:08:56
182.61.2.238 attackbotsspam
Invalid user leslie from 182.61.2.238 port 40186
2020-07-25 16:25:51
107.170.249.243 attackbotsspam
Invalid user ubuntu from 107.170.249.243 port 33396
2020-07-25 16:37:04
37.187.125.235 attackspam
Invalid user download from 37.187.125.235 port 53502
2020-07-25 16:38:34
111.229.4.247 attackspam
$f2bV_matches
2020-07-25 16:21:40
223.149.202.193 attackbots
Jul 25 05:51:17 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=223.149.202.193 DST=79.143.186.54 LEN=60 TOS=0x00 PREC=0x00 TTL=53 ID=11710 DF PROTO=TCP SPT=7572 DPT=23 WINDOW=5440 RES=0x00 SYN URGP=0 Jul 25 05:51:20 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=223.149.202.193 DST=79.143.186.54 LEN=60 TOS=0x00 PREC=0x00 TTL=53 ID=11711 DF PROTO=TCP SPT=7572 DPT=23 WINDOW=5440 RES=0x00 SYN URGP=0 Jul 25 05:51:26 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=223.149.202.193 DST=79.143.186.54 LEN=60 TOS=0x00 PREC=0x00 TTL=53 ID=11712 DF PROTO=TCP SPT=7572 DPT=23 WINDOW=5440 RES=0x00 SYN URGP=0
2020-07-25 16:34:08
222.186.180.147 attack
Jul 25 09:59:04 eventyay sshd[25090]: Failed password for root from 222.186.180.147 port 2020 ssh2
Jul 25 09:59:07 eventyay sshd[25090]: Failed password for root from 222.186.180.147 port 2020 ssh2
Jul 25 09:59:10 eventyay sshd[25090]: Failed password for root from 222.186.180.147 port 2020 ssh2
Jul 25 09:59:13 eventyay sshd[25090]: Failed password for root from 222.186.180.147 port 2020 ssh2
...
2020-07-25 16:05:00

Recently Reported IPs

142.93.88.84 103.216.252.195 47.251.78.5 18.206.244.47
64.23.228.138 115.45.43.93 40.81.230.77 14.212.94.128
134.122.98.159 172.17.13.249 60.250.193.1 163.171.175.254
20.168.122.6 38.2.90.247 39.98.48.88 223.104.84.158
213.209.159.151 64.227.4.242 113.120.139.244 218.15.218.54