Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.149.119.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57334
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;192.149.119.104.		IN	A

;; AUTHORITY SECTION:
.			492	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 21:20:41 CST 2022
;; MSG SIZE  rcvd: 108
Host info
104.119.149.192.in-addr.arpa domain name pointer test-functional-redirect.cambridgeenglish.org.
104.119.149.192.in-addr.arpa domain name pointer cambridgeassessmentenglish.uk.
104.119.149.192.in-addr.arpa domain name pointer admin.bulatsonline.org.
104.119.149.192.in-addr.arpa domain name pointer cambridgeassessmentenglish.org.uk.
104.119.149.192.in-addr.arpa domain name pointer cambridgeassessmentenglish.org.
104.119.149.192.in-addr.arpa domain name pointer www.cambridgeassessmentenglish.co.uk.
104.119.149.192.in-addr.arpa domain name pointer www.cambridgeenglish.org.
104.119.149.192.in-addr.arpa domain name pointer www.cambridgeassessmentenglish.net.
104.119.149.192.in-addr.arpa domain name pointer cambridgeassessmentenglish.co.uk.
104.119.149.192.in-addr.arpa domain name pointer cambridgeassessmentenglish.net.
104.119.149.192.in-addr.arpa domain name pointer www.cambridgeassessmentenglish.org.
104.119.149.192.in-addr.arpa domain name pointer www.cambridgeenglish.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.119.149.192.in-addr.arpa	name = www.cambridgeassessmentenglish.net.
104.119.149.192.in-addr.arpa	name = cambridgeassessmentenglish.co.uk.
104.119.149.192.in-addr.arpa	name = cambridgeassessmentenglish.net.
104.119.149.192.in-addr.arpa	name = www.cambridgeassessmentenglish.org.
104.119.149.192.in-addr.arpa	name = www.cambridgeenglish.cn.
104.119.149.192.in-addr.arpa	name = test-functional-redirect.cambridgeenglish.org.
104.119.149.192.in-addr.arpa	name = cambridgeassessmentenglish.uk.
104.119.149.192.in-addr.arpa	name = admin.bulatsonline.org.
104.119.149.192.in-addr.arpa	name = cambridgeassessmentenglish.org.uk.
104.119.149.192.in-addr.arpa	name = cambridgeassessmentenglish.org.
104.119.149.192.in-addr.arpa	name = www.cambridgeassessmentenglish.co.uk.
104.119.149.192.in-addr.arpa	name = www.cambridgeenglish.org.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
87.101.92.130 attack
port scan and connect, tcp 1433 (ms-sql-s)
2020-06-03 15:11:20
67.205.153.74 attackspambots
Attempt to log in with non-existing username: admin
2020-06-03 15:16:04
96.77.182.189 attackspambots
Jun  2 21:06:21 web1 sshd\[30803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.77.182.189  user=root
Jun  2 21:06:24 web1 sshd\[30803\]: Failed password for root from 96.77.182.189 port 60568 ssh2
Jun  2 21:10:09 web1 sshd\[31197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.77.182.189  user=root
Jun  2 21:10:11 web1 sshd\[31197\]: Failed password for root from 96.77.182.189 port 37748 ssh2
Jun  2 21:13:53 web1 sshd\[31495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.77.182.189  user=root
2020-06-03 15:22:08
113.141.67.253 attack
SMB Server BruteForce Attack
2020-06-03 15:25:15
52.232.246.89 attackbotsspam
Jun  3 08:03:39 hosting sshd[21455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.232.246.89  user=root
Jun  3 08:03:40 hosting sshd[21455]: Failed password for root from 52.232.246.89 port 46416 ssh2
...
2020-06-03 15:06:27
222.186.175.148 attack
Jun  3 08:44:33 eventyay sshd[6190]: Failed password for root from 222.186.175.148 port 19584 ssh2
Jun  3 08:44:37 eventyay sshd[6190]: Failed password for root from 222.186.175.148 port 19584 ssh2
Jun  3 08:44:40 eventyay sshd[6190]: Failed password for root from 222.186.175.148 port 19584 ssh2
Jun  3 08:44:46 eventyay sshd[6190]: error: maximum authentication attempts exceeded for root from 222.186.175.148 port 19584 ssh2 [preauth]
...
2020-06-03 14:48:29
186.119.116.226 attackbotsspam
Jun  3 15:46:00 localhost sshd[2633717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.119.116.226  user=root
Jun  3 15:46:02 localhost sshd[2633717]: Failed password for root from 186.119.116.226 port 54682 ssh2
...
2020-06-03 15:13:51
115.42.127.133 attackbotsspam
Triggered by Fail2Ban at Ares web server
2020-06-03 14:48:46
106.13.182.237 attackbotsspam
failed root login
2020-06-03 15:00:26
211.238.11.7 attack
 TCP (SYN) 211.238.11.7:54210 -> port 1433, len 40
2020-06-03 15:05:23
131.117.150.106 attack
2020-06-03T08:19:52.968333vps773228.ovh.net sshd[28762]: Failed password for root from 131.117.150.106 port 43990 ssh2
2020-06-03T08:23:17.812760vps773228.ovh.net sshd[28816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106-150-117-131.ip-addr.inexio.net  user=root
2020-06-03T08:23:19.694272vps773228.ovh.net sshd[28816]: Failed password for root from 131.117.150.106 port 58832 ssh2
2020-06-03T08:26:50.980600vps773228.ovh.net sshd[28875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106-150-117-131.ip-addr.inexio.net  user=root
2020-06-03T08:26:53.437376vps773228.ovh.net sshd[28875]: Failed password for root from 131.117.150.106 port 45386 ssh2
...
2020-06-03 14:51:15
210.12.49.162 attackspambots
5x Failed Password
2020-06-03 15:07:12
106.12.106.232 attack
Jun  3 03:35:25 ws12vmsma01 sshd[22103]: Failed password for root from 106.12.106.232 port 52924 ssh2
Jun  3 03:40:10 ws12vmsma01 sshd[22752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.106.232  user=root
Jun  3 03:40:12 ws12vmsma01 sshd[22752]: Failed password for root from 106.12.106.232 port 39796 ssh2
...
2020-06-03 15:27:16
195.54.166.182 attackbotsspam
Port scan on 3 port(s): 32149 32261 32739
2020-06-03 15:02:36
167.71.196.176 attack
Jun  3 05:45:37 h2779839 sshd[23195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.196.176  user=root
Jun  3 05:45:39 h2779839 sshd[23195]: Failed password for root from 167.71.196.176 port 57208 ssh2
Jun  3 05:47:50 h2779839 sshd[27259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.196.176  user=root
Jun  3 05:47:52 h2779839 sshd[27259]: Failed password for root from 167.71.196.176 port 35318 ssh2
Jun  3 05:50:05 h2779839 sshd[29002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.196.176  user=root
Jun  3 05:50:07 h2779839 sshd[29002]: Failed password for root from 167.71.196.176 port 41660 ssh2
Jun  3 05:52:27 h2779839 sshd[29075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.196.176  user=root
Jun  3 05:52:30 h2779839 sshd[29075]: Failed password for root from 167.71.196.176 port 48002 s
...
2020-06-03 15:18:43

Recently Reported IPs

192.149.119.105 192.149.119.103 192.149.219.4 192.149.119.226
192.149.119.106 192.149.2.154 192.149.21.43 192.149.119.193
192.149.74.73 192.149.74.85 192.149.93.213 192.149.55.51
192.149.55.17 192.150.149.139 192.150.16.118 192.150.16.117
192.149.55.43 192.149.97.60 192.151.147.82 192.150.149.160