Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.149.191.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39260
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.149.191.18.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 21:49:29 CST 2025
;; MSG SIZE  rcvd: 105
Host info
18.191.149.2.in-addr.arpa domain name pointer 2.149.191.18.tmi.telenormobil.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
18.191.149.2.in-addr.arpa	name = 2.149.191.18.tmi.telenormobil.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
221.162.255.66 attack
Oct 29 06:04:23 *** sshd[9690]: Failed password for invalid user factorio from 221.162.255.66 port 40508 ssh2
Oct 29 06:51:51 *** sshd[10605]: Failed password for invalid user gitlab from 221.162.255.66 port 53258 ssh2
Oct 29 07:29:08 *** sshd[11749]: Failed password for invalid user chughett from 221.162.255.66 port 40834 ssh2
Oct 29 08:06:06 *** sshd[12384]: Failed password for invalid user minecraft from 221.162.255.66 port 56626 ssh2
2019-10-30 05:17:50
193.56.28.224 spambotsattack
IP address used to send mail with hacked mail accounts
2019-10-30 05:18:08
46.38.144.32 attackbotsspam
Oct 29 22:20:44 relay postfix/smtpd\[20565\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 29 22:21:25 relay postfix/smtpd\[26202\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 29 22:21:49 relay postfix/smtpd\[20565\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 29 22:22:28 relay postfix/smtpd\[25169\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 29 22:22:51 relay postfix/smtpd\[15323\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-10-30 05:25:21
191.249.93.34 attackbotsspam
Unauthorized connection attempt from IP address 191.249.93.34 on Port 445(SMB)
2019-10-30 05:29:29
37.59.58.142 attack
Oct 29 19:10:14 *** sshd[7678]: Failed password for invalid user mongod from 37.59.58.142 port 48888 ssh2
Oct 29 19:23:16 *** sshd[7958]: Failed password for invalid user apache from 37.59.58.142 port 45414 ssh2
Oct 29 19:31:40 *** sshd[8120]: Failed password for invalid user maik from 37.59.58.142 port 38060 ssh2
Oct 29 19:40:12 *** sshd[8303]: Failed password for invalid user laur from 37.59.58.142 port 58942 ssh2
Oct 29 19:52:42 *** sshd[8550]: Failed password for invalid user tt from 37.59.58.142 port 33802 ssh2
Oct 29 19:56:56 *** sshd[8599]: Failed password for invalid user 1234 from 37.59.58.142 port 44244 ssh2
Oct 29 20:01:03 *** sshd[8669]: Failed password for invalid user Cold@2017 from 37.59.58.142 port 54692 ssh2
Oct 29 20:05:10 *** sshd[8760]: Failed password for invalid user 123 from 37.59.58.142 port 36900 ssh2
Oct 29 20:09:19 *** sshd[8865]: Failed password for invalid user yuri!@# from 37.59.58.142 port 47340 ssh2
Oct 29 20:13:32 *** sshd[8912]: Failed password for invalid user !QAZ2wsx from
2019-10-30 05:07:24
70.89.88.1 attack
Oct 29 21:51:34 vps691689 sshd[28943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.89.88.1
Oct 29 21:51:36 vps691689 sshd[28943]: Failed password for invalid user cht from 70.89.88.1 port 54461 ssh2
...
2019-10-30 05:11:39
40.73.78.233 attack
Oct 29 05:36:57 *** sshd[9197]: Failed password for invalid user remotos from 40.73.78.233 port 2624 ssh2
Oct 29 05:45:30 *** sshd[9429]: Failed password for invalid user alex from 40.73.78.233 port 2624 ssh2
Oct 29 06:02:49 *** sshd[9654]: Failed password for invalid user rodney from 40.73.78.233 port 2624 ssh2
Oct 29 06:20:14 *** sshd[9953]: Failed password for invalid user bl from 40.73.78.233 port 2624 ssh2
Oct 29 06:24:47 *** sshd[10059]: Failed password for invalid user home from 40.73.78.233 port 2624 ssh2
Oct 29 06:46:44 *** sshd[10551]: Failed password for invalid user system from 40.73.78.233 port 2624 ssh2
Oct 29 06:55:33 *** sshd[10648]: Failed password for invalid user akhtar from 40.73.78.233 port 2624 ssh2
Oct 29 07:13:28 *** sshd[11059]: Failed password for invalid user fcampreg from 40.73.78.233 port 2624 ssh2
Oct 29 07:17:55 *** sshd[11566]: Failed password for invalid user teampspeak3 from 40.73.78.233 port 2624 ssh2
Oct 29 07:22:27 *** sshd[11652]: Failed password for invalid user ts from
2019-10-30 05:04:19
138.197.195.52 attackbotsspam
Oct 29 22:02:48 vmanager6029 sshd\[372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.195.52  user=root
Oct 29 22:02:50 vmanager6029 sshd\[372\]: Failed password for root from 138.197.195.52 port 36566 ssh2
Oct 29 22:06:46 vmanager6029 sshd\[447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.195.52  user=root
2019-10-30 05:16:51
148.66.142.161 attack
/wp-login.php
2019-10-30 04:53:57
222.186.175.148 attackspambots
Oct 29 17:03:18 TORMINT sshd\[6258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
Oct 29 17:03:20 TORMINT sshd\[6258\]: Failed password for root from 222.186.175.148 port 17748 ssh2
Oct 29 17:03:24 TORMINT sshd\[6258\]: Failed password for root from 222.186.175.148 port 17748 ssh2
...
2019-10-30 05:26:37
45.55.42.17 attack
" "
2019-10-30 05:02:10
217.61.14.223 attackspam
Oct 29 22:47:00 server sshd\[20566\]: Invalid user zk from 217.61.14.223
Oct 29 22:47:00 server sshd\[20566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.14.223 
Oct 29 22:47:02 server sshd\[20566\]: Failed password for invalid user zk from 217.61.14.223 port 50862 ssh2
Oct 29 23:02:40 server sshd\[25979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.14.223  user=root
Oct 29 23:02:42 server sshd\[25979\]: Failed password for root from 217.61.14.223 port 41656 ssh2
...
2019-10-30 05:08:41
77.247.108.230 attackbots
1572379369 - 10/29/2019 21:02:49 Host: 77.247.108.230/77.247.108.230 Port: 5060 UDP Blocked
2019-10-30 05:01:38
218.31.33.34 attackbots
Oct 29 21:39:55 *** sshd[10481]: Failed password for invalid user saaf from 218.31.33.34 port 37272 ssh2
Oct 29 21:56:09 *** sshd[10803]: Failed password for invalid user ku from 218.31.33.34 port 53806 ssh2
Oct 29 22:11:49 *** sshd[11180]: Failed password for invalid user ev from 218.31.33.34 port 42090 ssh2
Oct 29 22:16:48 *** sshd[11257]: Failed password for invalid user Aliisa from 218.31.33.34 port 47612 ssh2
Oct 29 22:26:57 *** sshd[11480]: Failed password for invalid user rakesh from 218.31.33.34 port 58646 ssh2
Oct 29 22:31:50 *** sshd[11556]: Failed password for invalid user foxtrot from 218.31.33.34 port 35928 ssh2
Oct 29 22:36:44 *** sshd[11632]: Failed password for invalid user pi from 218.31.33.34 port 41446 ssh2
Oct 29 22:50:51 *** sshd[11969]: Failed password for invalid user iskren from 218.31.33.34 port 57974 ssh2
Oct 29 22:55:15 *** sshd[12029]: Failed password for invalid user kn from 218.31.33.34 port 35264 ssh2
Oct 29 22:59:38 *** sshd[12097]: Failed password for invalid user ralph from 2
2019-10-30 05:23:34
203.232.210.195 attack
Invalid user ctakes from 203.232.210.195 port 56606
2019-10-30 05:32:21

Recently Reported IPs

90.244.72.108 69.69.102.48 230.250.19.117 187.98.92.220
246.145.179.91 180.182.92.127 96.251.81.237 221.34.92.24
160.245.65.64 9.174.153.153 96.153.240.93 13.134.85.79
135.15.89.87 129.83.58.243 201.215.53.226 57.95.181.212
113.44.208.64 136.109.2.196 251.164.246.161 77.130.110.13