Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Argentina

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.124.149.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43467
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;190.124.149.136.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 09:41:16 CST 2025
;; MSG SIZE  rcvd: 108
Host info
136.149.124.190.in-addr.arpa domain name pointer customer-ftth-sl-190-124-149-136.megacable.com.ar.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.149.124.190.in-addr.arpa	name = customer-ftth-sl-190-124-149-136.megacable.com.ar.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
68.183.81.243 attackbotsspam
(sshd) Failed SSH login from 68.183.81.243 (IN/India/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 12 21:44:07 ubnt-55d23 sshd[15201]: Invalid user admin from 68.183.81.243 port 49824
Jun 12 21:44:09 ubnt-55d23 sshd[15201]: Failed password for invalid user admin from 68.183.81.243 port 49824 ssh2
2020-06-13 04:48:50
115.239.36.90 attack
Unauthorized connection attempt from IP address 115.239.36.90 on Port 445(SMB)
2020-06-13 04:15:53
41.189.166.20 attack
Unauthorized connection attempt from IP address 41.189.166.20 on Port 445(SMB)
2020-06-13 04:22:37
192.35.169.23 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 1311 proto: TCP cat: Misc Attack
2020-06-13 04:18:02
187.202.70.182 attack
Jun 12 09:40:07 host2 sshd[24388]: reveeclipse mapping checking getaddrinfo for dsl-187-202-70-182-dyn.prod-infinhostnameum.com.mx [187.202.70.182] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 12 09:40:07 host2 sshd[24388]: Invalid user mu from 187.202.70.182
Jun 12 09:40:07 host2 sshd[24388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.202.70.182 
Jun 12 09:40:09 host2 sshd[24388]: Failed password for invalid user mu from 187.202.70.182 port 20664 ssh2
Jun 12 09:40:09 host2 sshd[24388]: Received disconnect from 187.202.70.182: 11: Bye Bye [preauth]
Jun 12 09:44:36 host2 sshd[7651]: reveeclipse mapping checking getaddrinfo for dsl-187-202-70-182-dyn.prod-infinhostnameum.com.mx [187.202.70.182] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 12 09:44:36 host2 sshd[7651]: Invalid user rody from 187.202.70.182
Jun 12 09:44:36 host2 sshd[7651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.202.........
-------------------------------
2020-06-13 04:15:35
139.59.59.102 attack
Jun 12 19:52:33 cosmoit sshd[7230]: Failed password for root from 139.59.59.102 port 57318 ssh2
2020-06-13 04:47:17
106.53.86.116 attack
Jun 12 18:41:39 buvik sshd[23696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.86.116
Jun 12 18:41:40 buvik sshd[23696]: Failed password for invalid user zhuangzhenhua from 106.53.86.116 port 47876 ssh2
Jun 12 18:45:10 buvik sshd[24292]: Invalid user stormtech from 106.53.86.116
...
2020-06-13 04:26:46
186.89.47.30 attack
Unauthorized connection attempt from IP address 186.89.47.30 on Port 445(SMB)
2020-06-13 04:26:15
27.64.48.125 attackspambots
Automatic report - Port Scan Attack
2020-06-13 04:19:45
190.73.161.105 attackbotsspam
Unauthorized connection attempt from IP address 190.73.161.105 on Port 445(SMB)
2020-06-13 04:13:51
49.228.168.105 attack
Unauthorized connection attempt from IP address 49.228.168.105 on Port 445(SMB)
2020-06-13 04:21:43
144.22.108.33 attackspambots
Jun 12 19:42:43 *** sshd[27223]: Invalid user temp from 144.22.108.33
2020-06-13 04:10:10
45.201.206.94 attack
Unauthorized connection attempt from IP address 45.201.206.94 on Port 445(SMB)
2020-06-13 04:19:21
193.112.123.100 attackbotsspam
20 attempts against mh-ssh on cloud
2020-06-13 04:39:45
218.78.35.157 attackspambots
Brute-force attempt banned
2020-06-13 04:49:06

Recently Reported IPs

194.49.27.179 48.171.154.148 132.171.206.133 104.39.71.191
48.143.29.46 160.90.194.200 156.30.174.251 20.126.58.91
213.120.201.142 227.151.55.186 64.211.85.205 243.203.48.227
221.248.245.10 222.255.23.245 223.178.191.27 62.131.255.63
27.180.84.141 112.161.65.144 137.111.18.157 253.228.66.198