Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Egypt

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.149.89.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51009
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;196.149.89.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 01:32:59 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 45.89.149.196.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.89.149.196.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.49.226.47 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-23 00:28:32
37.49.226.250 attackbotsspam
port scan and connect, tcp 443 (https)
2020-05-23 00:36:35
195.54.166.183 attackbotsspam
Port scan on 50 port(s): 3006 3017 3046 3063 3068 3091 3095 3103 3126 3132 3135 3138 3145 3159 3173 3192 3222 3230 3307 3327 3356 3361 3380 3419 3466 3467 3486 3520 3558 3582 3586 3633 3748 3752 3767 3780 3782 3805 3816 3818 3853 3914 3917 3992 8181 8297 8302 8413 8418 8481
2020-05-23 00:05:22
45.143.220.241 attack
SIPVicious Scanner Detection
2020-05-23 00:20:00
62.102.148.69 attackspam
SSH invalid-user multiple login try
2020-05-23 00:26:23
117.27.88.61 attackbotsspam
Invalid user gua from 117.27.88.61 port 2083
2020-05-23 00:24:40
5.183.179.122 attackspambots
Email rejected due to spam filtering
2020-05-23 00:06:06
37.49.226.40 attackbotsspam
May 22 17:33:33 debian-2gb-nbg1-2 kernel: \[12420430.068479\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=37.49.226.40 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=1344 PROTO=TCP SPT=40419 DPT=50802 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-23 00:30:28
37.49.226.221 attackspambots
ZTE Router Exploit Scanner
2020-05-23 00:46:28
196.41.127.38 attackbotsspam
Scanning for exploits - /beta/wp-includes/wlwmanifest.xml
2020-05-23 00:14:39
45.143.220.99 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-23 00:11:47
106.52.42.153 attack
2020-05-22T13:51:55.514136  sshd[16961]: Invalid user thh from 106.52.42.153 port 41504
2020-05-22T13:51:55.528215  sshd[16961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.42.153
2020-05-22T13:51:55.514136  sshd[16961]: Invalid user thh from 106.52.42.153 port 41504
2020-05-22T13:51:57.422684  sshd[16961]: Failed password for invalid user thh from 106.52.42.153 port 41504 ssh2
...
2020-05-23 00:13:21
42.113.99.103 attack
Unauthorized connection attempt detected from IP address 42.113.99.103 to port 23 [T]
2020-05-23 00:17:49
37.49.226.245 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-23 00:38:37
59.80.40.147 attackbots
Invalid user dm from 59.80.40.147 port 60920
2020-05-23 00:44:39

Recently Reported IPs

95.25.121.57 42.8.61.149 254.176.230.231 157.200.130.9
130.93.100.172 31.102.39.248 70.125.20.129 64.180.16.27
190.176.11.166 66.223.210.159 47.5.174.30 26.73.157.41
67.229.171.211 46.9.37.49 138.20.3.41 136.150.185.74
82.213.166.241 45.123.216.126 184.162.109.148 203.15.132.206