Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.135.168.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18905
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.135.168.149.		IN	A

;; AUTHORITY SECTION:
.			59	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010900 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 23:32:04 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 149.168.135.164.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.168.135.164.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
176.214.60.193 attack
(Nov 24)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=29735 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 24)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=16578 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 23)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=2730 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 23)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=32065 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 23)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=25517 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 23)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=32126 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 23)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=19319 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 23)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=15198 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 23)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=24721 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 23)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=547 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 23)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=6996 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 23)  LEN=52 TOS=0x10 PREC=0x60 TTL=116 ID=24437 DF T...
2019-11-24 13:46:49
181.48.225.126 attack
Nov 24 11:45:19 itv-usvr-01 sshd[29459]: Invalid user glanz from 181.48.225.126
Nov 24 11:45:19 itv-usvr-01 sshd[29459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.225.126
Nov 24 11:45:19 itv-usvr-01 sshd[29459]: Invalid user glanz from 181.48.225.126
Nov 24 11:45:21 itv-usvr-01 sshd[29459]: Failed password for invalid user glanz from 181.48.225.126 port 53858 ssh2
Nov 24 11:54:16 itv-usvr-01 sshd[29769]: Invalid user squid from 181.48.225.126
2019-11-24 13:52:25
68.183.153.161 attackbotsspam
Nov 24 07:13:13 server sshd\[7762\]: User root from 68.183.153.161 not allowed because listed in DenyUsers
Nov 24 07:13:13 server sshd\[7762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.153.161  user=root
Nov 24 07:13:15 server sshd\[7762\]: Failed password for invalid user root from 68.183.153.161 port 41404 ssh2
Nov 24 07:19:24 server sshd\[6319\]: User root from 68.183.153.161 not allowed because listed in DenyUsers
Nov 24 07:19:24 server sshd\[6319\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.153.161  user=root
2019-11-24 13:24:02
112.21.191.252 attackspambots
Nov 24 01:54:49 firewall sshd[5128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.21.191.252
Nov 24 01:54:49 firewall sshd[5128]: Invalid user ker from 112.21.191.252
Nov 24 01:54:51 firewall sshd[5128]: Failed password for invalid user ker from 112.21.191.252 port 45256 ssh2
...
2019-11-24 13:32:55
222.186.175.212 attackbots
2019-11-24T05:43:12.973092abusebot-6.cloudsearch.cf sshd\[15398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212  user=root
2019-11-24 13:46:17
162.243.20.243 attackbotsspam
Nov 24 05:25:07 hcbbdb sshd\[6621\]: Invalid user Centos2016 from 162.243.20.243
Nov 24 05:25:07 hcbbdb sshd\[6621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.20.243
Nov 24 05:25:09 hcbbdb sshd\[6621\]: Failed password for invalid user Centos2016 from 162.243.20.243 port 49974 ssh2
Nov 24 05:31:28 hcbbdb sshd\[7266\]: Invalid user gramling from 162.243.20.243
Nov 24 05:31:28 hcbbdb sshd\[7266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.20.243
2019-11-24 13:47:08
129.28.114.240 attackspam
Nov 24 08:21:37 hosting sshd[14400]: Invalid user potage from 129.28.114.240 port 58898
Nov 24 08:21:37 hosting sshd[14400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.114.240
Nov 24 08:21:37 hosting sshd[14400]: Invalid user potage from 129.28.114.240 port 58898
Nov 24 08:21:40 hosting sshd[14400]: Failed password for invalid user potage from 129.28.114.240 port 58898 ssh2
...
2019-11-24 13:41:45
186.103.223.10 attackspam
Brute-force attempt banned
2019-11-24 13:26:12
177.203.152.89 attackspambots
Nov 24 00:22:01 123flo sshd[35651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.203.152.89  user=root
Nov 24 00:22:04 123flo sshd[35651]: Failed password for root from 177.203.152.89 port 34786 ssh2
Nov 24 00:22:58 123flo sshd[36152]: Invalid user user from 177.203.152.89
Nov 24 00:22:58 123flo sshd[36152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.203.152.89 
Nov 24 00:22:58 123flo sshd[36152]: Invalid user user from 177.203.152.89
Nov 24 00:23:00 123flo sshd[36152]: Failed password for invalid user user from 177.203.152.89 port 52974 ssh2
2019-11-24 13:28:16
218.107.133.49 attack
2019-11-23 22:54:23 dovecot_login authenticator failed for (lerctr.com) [218.107.133.49]:48602 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=nologin@lerctr.org)
2019-11-23 22:54:41 dovecot_login authenticator failed for (lerctr.com) [218.107.133.49]:50504 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=password123@lerctr.org)
2019-11-23 22:54:56 dovecot_login authenticator failed for (lerctr.com) [218.107.133.49]:52668 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=contact@lerctr.org)
...
2019-11-24 13:29:24
82.165.35.17 attack
Nov 24 05:54:16 vps647732 sshd[28537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.165.35.17
Nov 24 05:54:17 vps647732 sshd[28537]: Failed password for invalid user public from 82.165.35.17 port 60348 ssh2
...
2019-11-24 13:51:50
175.140.23.240 attack
Nov 24 01:54:19 vps46666688 sshd[27170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.140.23.240
Nov 24 01:54:20 vps46666688 sshd[27170]: Failed password for invalid user Qaz123! from 175.140.23.240 port 39525 ssh2
...
2019-11-24 13:48:31
145.239.76.165 attackspambots
Automatic report - XMLRPC Attack
2019-11-24 13:47:54
54.176.188.51 attack
/wp-login.php
/wordpress/wp-login.php
/blog/wp-login.php
2019-11-24 13:57:28
141.98.80.101 attackbotsspam
Nov 24 06:46:33 mail postfix/smtpd[19247]: warning: unknown[141.98.80.101]: SASL PLAIN authentication failed: 
Nov 24 06:46:33 mail postfix/smtpd[19657]: warning: unknown[141.98.80.101]: SASL PLAIN authentication failed: 
Nov 24 06:46:45 mail postfix/smtpd[19954]: warning: unknown[141.98.80.101]: SASL PLAIN authentication failed: 
Nov 24 06:46:45 mail postfix/smtpd[20132]: warning: unknown[141.98.80.101]: SASL PLAIN authentication failed:
2019-11-24 13:59:40

Recently Reported IPs

184.86.234.16 104.244.42.194 103.109.56.239 157.196.133.174
85.214.69.30 115.84.87.221 146.68.127.109 95.108.195.127
190.148.88.28 185.130.224.69 165.16.61.165 184.213.122.243
150.222.243.0 187.139.234.164 151.115.42.247 116.92.38.26
199.85.102.176 28.141.121.253 7.211.13.176 144.85.1.139