Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 182.168.149.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34125
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;182.168.149.126.		IN	A

;; AUTHORITY SECTION:
.			520	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 15:39:54 CST 2022
;; MSG SIZE  rcvd: 108
Host info
126.149.168.182.in-addr.arpa domain name pointer pb6a8957e.tubecm00.ap.so-net.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
126.149.168.182.in-addr.arpa	name = pb6a8957e.tubecm00.ap.so-net.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
2001:fd8:22a0:95c:6854:6efe:5c45:2258 attack
Port sniffing
2023-04-25 11:30:18
199.167.138.161 attack
Scan port
2023-05-03 12:51:45
184.105.247.195 proxy
VPN fraud
2023-03-29 12:53:46
164.138.20.101 spam
Spam firehose
2023-05-02 23:19:18
103.109.56.115 spambotsattackproxynormal
hgcyj
2023-05-04 23:29:09
103.157.48.95 spamattack
Penipu banyak menipu orang dengan modus berpura pura menjafi orang lain dab mengatas namakan perushaan lain
2023-04-25 22:21:48
162.142.125.87 proxy
VPN fraud
2023-03-29 12:58:45
193.35.18.113 attack
For the last couple of days, constantly trying to access my home PC, on various random ports, My Minecraft server log (attempt every 20 seconds):

[15:32:11] [Server thread/INFO]: com.mojang.authlib.GameProfile@5c90064d[id=,name=bcb_he_bjb_bfh,properties={},legacy=false] (/193.35.18.113:37536) lost connection: Disconnected
2023-05-08 11:43:39
121.166.140.160 attack
Brute-Force login jupyter notebook
2023-05-04 17:34:55
149.18.73.19 attack
Scan port
2023-04-06 12:52:43
192.241.225.20 attack
Scan port
2023-03-31 12:50:26
92.63.196.148 attack
sshd 68699 - - banner exchange: Connection from 92.63.196.148 port 64649: invalid format
2023-05-01 14:22:24
157.240.241.35 spambotsattackproxynormal
157.240.241.35
2023-04-23 13:12:31
103.160.201.163 spambotsattackproxynormal
banen
2023-03-28 03:11:06
103.48.168.176 spamattack
http//103.48.168.176
2023-03-30 07:37:24

Recently Reported IPs

182.166.193.137 182.160.99.109 182.173.73.214 182.162.81.133
182.173.75.198 182.176.83.34 182.176.147.203 182.176.171.179
182.177.190.197 182.177.196.5 182.176.169.239 182.176.106.159
182.18.228.22 182.18.228.181 182.18.198.233 182.18.255.206
182.176.102.211 182.180.122.76 182.180.118.44 182.180.107.116