Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.149.118.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6634
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.149.118.134.			IN	A

;; AUTHORITY SECTION:
.			115	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122800 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 28 21:34:06 CST 2021
;; MSG SIZE  rcvd: 106
Host info
134.118.149.2.in-addr.arpa domain name pointer 2.149.118.134.tmi.telenormobil.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.118.149.2.in-addr.arpa	name = 2.149.118.134.tmi.telenormobil.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.9.153 attackspam
Dec 18 10:46:49 server sshd\[9259\]: Invalid user shuto from 106.13.9.153
Dec 18 10:46:49 server sshd\[9259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.9.153 
Dec 18 10:46:51 server sshd\[9259\]: Failed password for invalid user shuto from 106.13.9.153 port 42482 ssh2
Dec 18 10:54:55 server sshd\[11273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.9.153  user=root
Dec 18 10:54:57 server sshd\[11273\]: Failed password for root from 106.13.9.153 port 57844 ssh2
...
2019-12-18 20:54:40
41.72.197.182 attack
--- report ---
Dec 18 06:30:30 sshd: Connection from 41.72.197.182 port 53270
2019-12-18 20:55:58
5.180.245.244 attackbots
Wordpress login attempts
2019-12-18 20:46:44
42.81.123.239 attackspam
12/18/2019-01:25:39.864549 42.81.123.239 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-12-18 20:25:07
45.248.57.193 attack
Unauthorized connection attempt detected from IP address 45.248.57.193 to port 445
2019-12-18 20:48:24
159.203.201.217 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-18 20:36:45
182.191.90.99 attackspambots
1576650315 - 12/18/2019 07:25:15 Host: 182.191.90.99/182.191.90.99 Port: 445 TCP Blocked
2019-12-18 20:33:23
61.105.85.98 attackbotsspam
1576650267 - 12/18/2019 07:24:27 Host: 61.105.85.98/61.105.85.98 Port: 445 TCP Blocked
2019-12-18 20:45:29
208.116.58.42 attackbots
firewall-block, port(s): 445/tcp
2019-12-18 20:40:26
51.91.118.71 attackspam
Dec 17 08:56:35 liveconfig01 sshd[22330]: Invalid user yoyo from 51.91.118.71
Dec 17 08:56:35 liveconfig01 sshd[22330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.118.71
Dec 17 08:56:36 liveconfig01 sshd[22330]: Failed password for invalid user yoyo from 51.91.118.71 port 56420 ssh2
Dec 17 08:56:36 liveconfig01 sshd[22330]: Received disconnect from 51.91.118.71 port 56420:11: Bye Bye [preauth]
Dec 17 08:56:36 liveconfig01 sshd[22330]: Disconnected from 51.91.118.71 port 56420 [preauth]
Dec 17 09:07:42 liveconfig01 sshd[22781]: Invalid user jahnace from 51.91.118.71
Dec 17 09:07:42 liveconfig01 sshd[22781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.118.71
Dec 17 09:07:44 liveconfig01 sshd[22781]: Failed password for invalid user jahnace from 51.91.118.71 port 53534 ssh2
Dec 17 09:07:44 liveconfig01 sshd[22781]: Received disconnect from 51.91.118.71 port 53534:11: Bye By........
-------------------------------
2019-12-18 20:27:21
92.63.194.26 attack
Dec 18 10:13:26 XXX sshd[59760]: Invalid user admin from 92.63.194.26 port 35156
2019-12-18 20:28:04
37.49.230.81 attackspambots
\[2019-12-18 07:13:58\] NOTICE\[2839\] chan_sip.c: Registration from '"808" \' failed for '37.49.230.81:5294' - Wrong password
\[2019-12-18 07:13:58\] SECURITY\[2857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-18T07:13:58.085-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="808",SessionID="0x7f0fb4287008",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.230.81/5294",Challenge="36e89487",ReceivedChallenge="36e89487",ReceivedHash="196886df6a842e039194c5c1a0c3832c"
\[2019-12-18 07:13:58\] NOTICE\[2839\] chan_sip.c: Registration from '"808" \' failed for '37.49.230.81:5294' - Wrong password
\[2019-12-18 07:13:58\] SECURITY\[2857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-18T07:13:58.210-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="808",SessionID="0x7f0fb4123628",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.2
2019-12-18 20:29:26
185.163.47.181 attackspambots
Honeypot attack, port: 81, PTR: 185-163-47-181.mivocloud.com.
2019-12-18 20:31:41
180.250.111.17 attackspambots
2019-12-18T06:19:08.218397abusebot-2.cloudsearch.cf sshd\[17092\]: Invalid user bu from 180.250.111.17 port 60583
2019-12-18T06:19:08.226495abusebot-2.cloudsearch.cf sshd\[17092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.111.17
2019-12-18T06:19:09.758200abusebot-2.cloudsearch.cf sshd\[17092\]: Failed password for invalid user bu from 180.250.111.17 port 60583 ssh2
2019-12-18T06:25:41.645407abusebot-2.cloudsearch.cf sshd\[17134\]: Invalid user muckersie from 180.250.111.17 port 38038
2019-12-18 20:20:40
171.15.16.116 attack
port scan and connect, tcp 1433 (ms-sql-s)
2019-12-18 20:52:16

Recently Reported IPs

72.159.226.213 205.242.250.167 107.27.223.230 231.249.201.69
187.247.251.63 29.244.78.57 86.70.192.229 224.214.12.91
92.119.193.227 242.105.157.232 176.230.100.1 29.88.156.21
2.105.232.213 233.12.230.254 50.2.10.137 54.58.45.109
34.225.217.44 6.98.165.210 11.204.173.216 44.171.34.128