Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: North Bergen

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
167.99.149.11 attack
Automatic report generated by Wazuh
2020-10-10 03:56:19
167.99.149.11 attack
can 167.99.149.11 [09/Oct/2020:18:09:47 "-" "POST /wp-login.php 200 5780
167.99.149.11 [09/Oct/2020:18:42:33 "-" "GET /wp-login.php 200 9378
167.99.149.11 [09/Oct/2020:18:42:40 "-" "POST /wp-login.php 200 9495
2020-10-09 19:52:36
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 167.99.149.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41466
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;167.99.149.249.			IN	A

;; AUTHORITY SECTION:
.			312	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022102100 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 21 17:19:31 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 249.149.99.167.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 249.149.99.167.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.107.188.11 attackbots
Unauthorized connection attempt detected from IP address 202.107.188.11 to port 1433 [T]
2020-04-23 19:01:04
195.40.181.55 attackbots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-04-23 19:01:17
95.85.12.122 attackspam
Apr 23 12:23:01 minden010 sshd[22642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.12.122
Apr 23 12:23:04 minden010 sshd[22642]: Failed password for invalid user admin from 95.85.12.122 port 24587 ssh2
Apr 23 12:26:41 minden010 sshd[24440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.12.122
...
2020-04-23 19:16:48
185.202.1.231 attackbotsspam
ET DROP Dshield Block Listed Source group 1 - port: 10000 proto: TCP cat: Misc Attack
2020-04-23 19:07:42
87.27.155.225 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 77 - port: 88 proto: TCP cat: Misc Attack
2020-04-23 19:21:17
71.6.146.186 attack
[Wed Apr 22 00:33:41 2020] - DDoS Attack From IP: 71.6.146.186 Port: 24858
2020-04-23 19:28:34
185.156.73.52 attack
04/23/2020-07:02:24.721394 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-23 19:12:27
185.143.223.244 attack
ET DROP Dshield Block Listed Source group 1 - port: 3392 proto: TCP cat: Misc Attack
2020-04-23 19:13:00
64.227.21.239 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 52 - port: 1472 proto: TCP cat: Misc Attack
2020-04-23 19:30:24
79.124.62.86 attackspambots
Unauthorized connection attempt from IP address 79.124.62.86 on Port 3389(RDP)
2020-04-23 19:25:43
185.202.1.246 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 10000 proto: TCP cat: Misc Attack
2020-04-23 19:02:05
185.202.1.238 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 10000 proto: TCP cat: Misc Attack
2020-04-23 19:04:34
89.248.172.123 attackbots
89.248.172.123 was recorded 10 times by 8 hosts attempting to connect to the following ports: 53413. Incident counter (4h, 24h, all-time): 10, 46, 68
2020-04-23 19:19:37
45.55.32.34 attackspam
Port scan: Attack repeated for 24 hours
2020-04-23 19:35:51
45.70.216.74 attack
firewall-block, port(s): 6201/tcp
2020-04-23 19:34:54

Recently Reported IPs

1.9.53.136 65.43.151.200 56.159.75.48 185.176.18.8
138.254.158.36 10.230.190.31 173.162.18.100 172.25.141.43
247.49.106.3 243.74.248.177 36.238.58.68 8.156.10.90
236.160.180.168 13.190.81.1 47.195.210.201 124.66.143.237
71.11.77.70 146.70.236.128 129.99.220.199 105.73.3.7