Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.149.119.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60993
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;192.149.119.103.		IN	A

;; AUTHORITY SECTION:
.			139	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 21:20:41 CST 2022
;; MSG SIZE  rcvd: 108
Host info
103.119.149.192.in-addr.arpa domain name pointer beta.cie.org.uk.
103.119.149.192.in-addr.arpa domain name pointer cie.org.uk.
103.119.149.192.in-addr.arpa domain name pointer recognition.cie.org.uk.
103.119.149.192.in-addr.arpa domain name pointer www.cambridgestudents.org.uk.
103.119.149.192.in-addr.arpa domain name pointer cambridgeinternational.com.
103.119.149.192.in-addr.arpa domain name pointer prd.cie.org.uk.
103.119.149.192.in-addr.arpa domain name pointer redirect.cambridgeinternational.org.
103.119.149.192.in-addr.arpa domain name pointer www.cambridgeinternational.org.
103.119.149.192.in-addr.arpa domain name pointer cambridgeinternational.org.
Nslookup info:
b'103.119.149.192.in-addr.arpa	name = www.cambridgestudents.org.uk.
103.119.149.192.in-addr.arpa	name = beta.cie.org.uk.
103.119.149.192.in-addr.arpa	name = cambridgeinternational.com.
103.119.149.192.in-addr.arpa	name = www.cambridgeinternational.org.
103.119.149.192.in-addr.arpa	name = redirect.cambridgeinternational.org.
103.119.149.192.in-addr.arpa	name = cie.org.uk.
103.119.149.192.in-addr.arpa	name = recognition.cie.org.uk.
103.119.149.192.in-addr.arpa	name = cambridgeinternational.org.
103.119.149.192.in-addr.arpa	name = prd.cie.org.uk.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
197.211.225.66 attackbots
Jun 26 08:23:11 web24hdcode sshd[119780]: Invalid user gameserver from 197.211.225.66 port 56361
Jun 26 08:23:11 web24hdcode sshd[119780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.211.225.66
Jun 26 08:23:11 web24hdcode sshd[119780]: Invalid user gameserver from 197.211.225.66 port 56361
Jun 26 08:23:13 web24hdcode sshd[119780]: Failed password for invalid user gameserver from 197.211.225.66 port 56361 ssh2
Jun 26 08:25:19 web24hdcode sshd[119783]: Invalid user oravis from 197.211.225.66 port 36936
Jun 26 08:25:19 web24hdcode sshd[119783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.211.225.66
Jun 26 08:25:19 web24hdcode sshd[119783]: Invalid user oravis from 197.211.225.66 port 36936
Jun 26 08:25:21 web24hdcode sshd[119783]: Failed password for invalid user oravis from 197.211.225.66 port 36936 ssh2
Jun 26 08:27:20 web24hdcode sshd[119785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=s
2019-06-26 16:56:17
122.226.195.158 attackbots
Unauthorized connection attempt from IP address 122.226.195.158 on Port 445(SMB)
2019-06-26 17:01:04
159.192.102.4 attackbots
445/tcp 445/tcp 445/tcp...
[2019-05-01/06-26]9pkt,1pt.(tcp)
2019-06-26 16:57:21
107.172.145.135 attackbots
$f2bV_matches
2019-06-26 16:51:11
1.25.82.14 attackbots
DATE:2019-06-26 05:48:59, IP:1.25.82.14, PORT:1433 - MSSQL brute force auth on a honeypot server (epe-dc)
2019-06-26 16:34:06
59.48.153.181 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-26 03:31:28,852 INFO [amun_request_handler] PortScan Detected on Port: 445 (59.48.153.181)
2019-06-26 16:41:04
150.95.114.70 attack
Automatic report - Web App Attack
2019-06-26 16:55:17
103.76.204.22 attack
Unauthorized connection attempt from IP address 103.76.204.22 on Port 445(SMB)
2019-06-26 16:54:57
150.95.52.111 attack
Scanning and Vuln Attempts
2019-06-26 16:49:45
220.177.175.236 attackbotsspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(06261032)
2019-06-26 16:33:11
46.107.102.102 attackbotsspam
Jun 26 07:59:50 *** sshd[21089]: Invalid user daniel from 46.107.102.102
2019-06-26 16:28:03
150.95.113.182 attack
Scanning and Vuln Attempts
2019-06-26 16:57:44
99.37.246.236 attack
Brute force attempt
2019-06-26 16:43:29
114.129.20.14 attackbotsspam
Unauthorized connection attempt from IP address 114.129.20.14 on Port 445(SMB)
2019-06-26 16:24:51
154.81.81.54 attackbots
Scanning and Vuln Attempts
2019-06-26 16:37:30

Recently Reported IPs

192.149.119.104 192.149.219.4 192.149.119.226 192.149.119.106
192.149.2.154 192.149.21.43 192.149.119.193 192.149.74.73
192.149.74.85 192.149.93.213 192.149.55.51 192.149.55.17
192.150.149.139 192.150.16.118 192.150.16.117 192.149.55.43
192.149.97.60 192.151.147.82 192.150.149.160 192.151.148.242