Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.80.149.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2097
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;198.80.149.143.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 08:35:36 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 143.149.80.198.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 143.149.80.198.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.211.76.101 attackbotsspam
Aug 10 02:12:59 [munged] sshd[6490]: Invalid user fedor from 129.211.76.101 port 46908
Aug 10 02:12:59 [munged] sshd[6490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.76.101
2019-08-10 08:58:01
103.81.86.217 attack
Automatic report - Banned IP Access
2019-08-10 08:46:01
79.8.86.93 attack
Aug 10 00:38:18 mail sshd\[32071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.8.86.93  user=root
Aug 10 00:38:20 mail sshd\[32071\]: Failed password for root from 79.8.86.93 port 55906 ssh2
...
2019-08-10 08:24:25
81.22.45.223 attack
Port scan on 14 port(s): 42 444 1002 1003 1007 1009 1488 2016 2017 3333 4444 5555 6666 7777
2019-08-10 08:37:09
13.250.102.170 attackspam
Brute force SMTP login attempted.
...
2019-08-10 08:39:40
123.125.71.41 attackbotsspam
Automatic report - Banned IP Access
2019-08-10 08:40:36
13.93.67.34 attackbots
Brute force SMTP login attempted.
...
2019-08-10 08:29:43
125.230.102.178 attack
Honeypot attack, port: 23, PTR: 125-230-102-178.dynamic-ip.hinet.net.
2019-08-10 08:54:49
130.105.68.200 attackbotsspam
Aug 10 00:29:53 ncomp sshd[18083]: Invalid user david from 130.105.68.200
Aug 10 00:29:53 ncomp sshd[18083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.105.68.200
Aug 10 00:29:53 ncomp sshd[18083]: Invalid user david from 130.105.68.200
Aug 10 00:29:55 ncomp sshd[18083]: Failed password for invalid user david from 130.105.68.200 port 40666 ssh2
2019-08-10 08:27:38
129.211.10.211 attackbotsspam
Brute force SMTP login attempted.
...
2019-08-10 09:04:46
194.55.187.12 attackspam
2019-08-09 UTC: 4x - root(4x)
2019-08-10 08:42:55
104.236.58.55 attack
Aug  9 13:27:57 TORMINT sshd\[7181\]: Invalid user rakhi from 104.236.58.55
Aug  9 13:27:57 TORMINT sshd\[7181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.58.55
Aug  9 13:28:00 TORMINT sshd\[7181\]: Failed password for invalid user rakhi from 104.236.58.55 port 42352 ssh2
...
2019-08-10 08:25:28
197.33.113.225 attack
Honeypot attack, port: 23, PTR: host-197.33.113.225.tedata.net.
2019-08-10 08:58:20
13.76.191.11 attackspam
Brute force SMTP login attempted.
...
2019-08-10 08:31:39
129.226.57.237 attackbotsspam
Brute force SMTP login attempted.
...
2019-08-10 08:46:34

Recently Reported IPs

214.232.38.200 133.239.44.140 238.189.148.83 80.172.246.53
87.240.146.170 120.76.143.123 171.235.71.71 34.10.210.181
218.101.255.8 75.25.242.253 139.132.183.230 69.192.82.182
8.67.241.30 72.63.101.190 64.43.216.252 77.243.254.157
71.97.218.217 92.24.15.169 166.118.38.109 81.58.237.39