Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.94.141.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52843
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.94.141.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011101 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 12 12:21:35 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 149.141.94.197.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.141.94.197.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.85.15.251 attack
Dec 24 09:00:20 v22018086721571380 sshd[10627]: Failed password for invalid user 120 from 190.85.15.251 port 34256 ssh2
Dec 24 09:02:21 v22018086721571380 sshd[10731]: Failed password for invalid user schuetzl from 190.85.15.251 port 50685 ssh2
2019-12-24 21:48:48
173.44.36.101 attackbots
1,23-14/07 [bc01/m09] PostRequest-Spammer scoring: paris
2019-12-24 21:53:41
51.38.188.63 attackbots
$f2bV_matches
2019-12-24 21:35:40
198.108.67.61 attack
Scanning random ports - tries to find possible vulnerable services
2019-12-24 21:31:04
52.36.131.219 attackspambots
12/24/2019-14:30:19.834719 52.36.131.219 Protocol: 6 SURICATA TLS invalid record/traffic
2019-12-24 21:43:29
62.148.142.202 attackbotsspam
Invalid user rpm from 62.148.142.202 port 49218
2019-12-24 21:45:39
64.185.3.117 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2019-12-24 21:56:06
49.234.64.252 attackbotsspam
Automatic report - SSH Brute-Force Attack
2019-12-24 21:57:22
49.234.206.45 attackspam
ssh brute force
2019-12-24 21:56:33
106.12.46.104 attack
Dec 24 14:22:47 dedicated sshd[13772]: Invalid user 1QAZ3EDC from 106.12.46.104 port 47558
2019-12-24 21:55:45
18.162.41.68 attackbotsspam
WordPress wp-login brute force :: 18.162.41.68 0.144 - [24/Dec/2019:07:14:42  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1806 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2019-12-24 21:25:00
85.93.52.99 attackspam
Invalid user bambang from 85.93.52.99 port 49780
2019-12-24 21:59:22
14.161.17.124 attack
Unauthorized connection attempt detected from IP address 14.161.17.124 to port 445
2019-12-24 21:53:23
139.59.87.250 attackspam
Invalid user hetti from 139.59.87.250 port 50528
2019-12-24 21:30:34
197.253.254.18 attack
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-12-24 21:58:26

Recently Reported IPs

62.253.200.85 216.235.154.147 81.168.30.167 202.144.208.70
142.1.182.44 21.141.127.162 109.207.68.23 71.151.127.147
247.134.22.168 199.129.91.77 243.230.89.103 77.84.159.86
153.148.171.144 81.182.119.11 54.80.201.4 187.250.201.137
50.116.104.227 177.64.103.92 71.196.88.86 155.196.165.239