Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.164.149.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53327
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;199.164.149.86.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 20:57:04 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 86.149.164.199.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 199.164.149.86.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
45.79.20.188 attackspambots
04/04/2020-19:08:17.925636 45.79.20.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-04-05 07:09:40
42.51.12.20 attack
Unauthorized access detected from black listed ip!
2020-04-05 07:11:45
194.26.29.113 attackspam
Apr  5 01:11:21 debian-2gb-nbg1-2 kernel: \[8300914.706753\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.113 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=63098 PROTO=TCP SPT=44064 DPT=1030 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-05 07:12:33
118.24.90.64 attackbots
Apr  4 18:43:32 ny01 sshd[657]: Failed password for root from 118.24.90.64 port 34046 ssh2
Apr  4 18:47:28 ny01 sshd[1164]: Failed password for root from 118.24.90.64 port 50450 ssh2
2020-04-05 07:31:28
218.3.48.49 attack
Apr  5 00:44:00 pornomens sshd\[1693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.3.48.49  user=root
Apr  5 00:44:02 pornomens sshd\[1693\]: Failed password for root from 218.3.48.49 port 35678 ssh2
Apr  5 00:51:27 pornomens sshd\[1708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.3.48.49  user=root
...
2020-04-05 07:28:14
112.85.42.176 attack
2020-04-04T23:20:48.281428abusebot-3.cloudsearch.cf sshd[29908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
2020-04-04T23:20:50.147193abusebot-3.cloudsearch.cf sshd[29908]: Failed password for root from 112.85.42.176 port 56080 ssh2
2020-04-04T23:20:53.483737abusebot-3.cloudsearch.cf sshd[29908]: Failed password for root from 112.85.42.176 port 56080 ssh2
2020-04-04T23:20:48.281428abusebot-3.cloudsearch.cf sshd[29908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
2020-04-04T23:20:50.147193abusebot-3.cloudsearch.cf sshd[29908]: Failed password for root from 112.85.42.176 port 56080 ssh2
2020-04-04T23:20:53.483737abusebot-3.cloudsearch.cf sshd[29908]: Failed password for root from 112.85.42.176 port 56080 ssh2
2020-04-04T23:20:48.281428abusebot-3.cloudsearch.cf sshd[29908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruse
...
2020-04-05 07:36:05
158.69.220.70 attackbotsspam
Apr  5 01:23:44 host01 sshd[21639]: Failed password for root from 158.69.220.70 port 41012 ssh2
Apr  5 01:27:55 host01 sshd[22491]: Failed password for root from 158.69.220.70 port 51932 ssh2
...
2020-04-05 07:43:52
91.213.77.203 attackbots
Fail2Ban Ban Triggered (2)
2020-04-05 07:31:52
223.85.222.14 attackbots
2020-04-05T00:53:57.678367rocketchat.forhosting.nl sshd[11708]: Failed password for root from 223.85.222.14 port 49204 ssh2
2020-04-05T00:58:34.534859rocketchat.forhosting.nl sshd[11898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.85.222.14  user=root
2020-04-05T00:58:36.264239rocketchat.forhosting.nl sshd[11898]: Failed password for root from 223.85.222.14 port 41540 ssh2
...
2020-04-05 07:30:39
145.239.196.14 attackspambots
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-04-05 07:25:56
95.60.150.171 attackbotsspam
Email rejected due to spam filtering
2020-04-05 07:36:36
45.230.57.21 attack
Email rejected due to spam filtering
2020-04-05 07:45:31
92.118.38.82 attackbots
Apr  5 01:35:14 relay postfix/smtpd\[7283\]: warning: unknown\[92.118.38.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  5 01:35:38 relay postfix/smtpd\[25023\]: warning: unknown\[92.118.38.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  5 01:35:48 relay postfix/smtpd\[6256\]: warning: unknown\[92.118.38.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  5 01:36:12 relay postfix/smtpd\[1602\]: warning: unknown\[92.118.38.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  5 01:36:22 relay postfix/smtpd\[6255\]: warning: unknown\[92.118.38.82\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-05 07:40:48
178.49.9.210 attackspam
Apr  5 00:36:12 vps sshd[10267]: Failed password for root from 178.49.9.210 port 56568 ssh2
Apr  5 00:44:19 vps sshd[10767]: Failed password for root from 178.49.9.210 port 49414 ssh2
...
2020-04-05 07:18:47
117.66.243.77 attackbotsspam
$f2bV_matches
2020-04-05 07:28:37

Recently Reported IPs

170.251.224.210 179.246.36.95 87.97.165.2 21.58.169.4
240.31.225.89 60.234.226.129 255.113.230.40 144.176.149.252
165.144.49.177 57.125.87.191 142.217.189.76 134.64.110.11
236.171.118.13 30.139.203.227 248.158.182.23 108.205.81.216
239.11.100.139 44.2.58.173 55.100.157.64 80.170.3.151