Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Subang Jaya

Region: Selangor

Country: Malaysia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 175.139.229.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60768
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;175.139.229.149.		IN	A

;; AUTHORITY SECTION:
.			106	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011601 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 17 11:15:15 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 149.229.139.175.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.229.139.175.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
60.12.8.240 attack
Sep 13 13:02:54 mail sshd\[27591\]: Invalid user 123456789 from 60.12.8.240 port 56254
Sep 13 13:02:54 mail sshd\[27591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.12.8.240
Sep 13 13:02:56 mail sshd\[27591\]: Failed password for invalid user 123456789 from 60.12.8.240 port 56254 ssh2
Sep 13 13:11:37 mail sshd\[28875\]: Invalid user steamsteam from 60.12.8.240 port 50740
Sep 13 13:11:37 mail sshd\[28875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.12.8.240
2019-09-14 00:17:12
176.31.172.40 attackbots
Automatic report - Banned IP Access
2019-09-14 00:03:19
123.206.76.184 attackbotsspam
Sep 13 17:55:30 andromeda sshd\[5314\]: Invalid user admin from 123.206.76.184 port 44279
Sep 13 17:55:30 andromeda sshd\[5314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.76.184
Sep 13 17:55:32 andromeda sshd\[5314\]: Failed password for invalid user admin from 123.206.76.184 port 44279 ssh2
2019-09-14 00:09:54
120.1.5.70 attackbotsspam
Unauthorised access (Sep 13) SRC=120.1.5.70 LEN=40 TTL=49 ID=58881 TCP DPT=8080 WINDOW=46060 SYN 
Unauthorised access (Sep 12) SRC=120.1.5.70 LEN=40 TTL=49 ID=29350 TCP DPT=8080 WINDOW=34499 SYN 
Unauthorised access (Sep 12) SRC=120.1.5.70 LEN=40 TTL=49 ID=38647 TCP DPT=8080 WINDOW=34499 SYN
2019-09-13 23:48:07
58.52.85.172 attackspam
Rude login attack (4 tries in 1d)
2019-09-13 23:58:36
182.150.58.202 attackspambots
23/tcp 23/tcp
[2019-08-25/09-13]2pkt
2019-09-14 00:40:21
118.25.87.27 attack
Sep 13 12:16:56 ip-172-31-62-245 sshd\[15901\]: Invalid user admin from 118.25.87.27\
Sep 13 12:16:58 ip-172-31-62-245 sshd\[15901\]: Failed password for invalid user admin from 118.25.87.27 port 41478 ssh2\
Sep 13 12:21:23 ip-172-31-62-245 sshd\[15935\]: Invalid user user02 from 118.25.87.27\
Sep 13 12:21:25 ip-172-31-62-245 sshd\[15935\]: Failed password for invalid user user02 from 118.25.87.27 port 54446 ssh2\
Sep 13 12:25:52 ip-172-31-62-245 sshd\[15957\]: Invalid user myftp from 118.25.87.27\
2019-09-14 00:34:12
183.82.109.98 attackspam
SSH Brute-Force attacks
2019-09-14 00:13:09
49.88.112.113 attack
Sep 13 06:09:52 web9 sshd\[24026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
Sep 13 06:09:53 web9 sshd\[24026\]: Failed password for root from 49.88.112.113 port 34128 ssh2
Sep 13 06:10:49 web9 sshd\[24203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
Sep 13 06:10:51 web9 sshd\[24203\]: Failed password for root from 49.88.112.113 port 11150 ssh2
Sep 13 06:11:50 web9 sshd\[24382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
2019-09-14 00:12:02
123.24.170.125 attackspam
445/tcp 445/tcp
[2019-08-16/09-13]2pkt
2019-09-14 00:33:29
182.61.105.89 attackspam
Sep 13 05:29:11 tdfoods sshd\[7402\]: Invalid user 1qaz2wsx from 182.61.105.89
Sep 13 05:29:11 tdfoods sshd\[7402\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.105.89
Sep 13 05:29:13 tdfoods sshd\[7402\]: Failed password for invalid user 1qaz2wsx from 182.61.105.89 port 41568 ssh2
Sep 13 05:34:14 tdfoods sshd\[7821\]: Invalid user qweasd123 from 182.61.105.89
Sep 13 05:34:14 tdfoods sshd\[7821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.105.89
2019-09-13 23:47:30
103.25.75.134 attack
Unauthorized IMAP connection attempt
2019-09-13 23:56:47
218.4.239.146 attackspam
Trying to log into mailserver (postfix/smtp) using multiple names and passwords
2019-09-14 00:48:25
211.234.99.140 attackbotsspam
scan z
2019-09-14 00:50:35
200.6.175.10 attackbotsspam
Sent mail to target address hacked/leaked from abandonia in 2016
2019-09-14 00:29:20

Recently Reported IPs

33.108.125.148 198.238.212.151 87.228.185.91 217.48.75.48
229.41.168.8 4.148.83.8 136.12.164.82 197.204.252.131
96.28.207.119 200.132.239.120 136.190.89.223 9.24.189.4
100.232.24.153 247.87.170.200 173.164.208.106 198.226.64.231
180.119.210.39 9.225.238.18 218.75.140.123 222.80.227.112