Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tolvsrød

Region: unknown

Country: Norway

Internet Service Provider: Telenor

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.149.70.167
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16077
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.149.70.167.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030802 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 09 09:29:33 CST 2025
;; MSG SIZE  rcvd: 105
Host info
167.70.149.2.in-addr.arpa domain name pointer 2.149.70.167.tmi.telenormobil.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
167.70.149.2.in-addr.arpa	name = 2.149.70.167.tmi.telenormobil.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
79.124.62.25 attackspambots
Dec 10 03:33:16 debian-2gb-vpn-nbg1-1 kernel: [316382.518836] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=79.124.62.25 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=41156 PROTO=TCP SPT=49080 DPT=5935 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-10 09:31:39
175.211.116.234 attackbotsspam
2019-12-10T04:59:21.250650abusebot-5.cloudsearch.cf sshd\[20471\]: Invalid user robert from 175.211.116.234 port 56960
2019-12-10 13:22:15
52.43.25.117 attackbots
12/10/2019-05:59:25.858534 52.43.25.117 Protocol: 6 SURICATA TLS invalid record/traffic
2019-12-10 13:15:33
222.186.173.226 attack
Dec 10 05:59:24 tux-35-217 sshd\[1975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226  user=root
Dec 10 05:59:26 tux-35-217 sshd\[1975\]: Failed password for root from 222.186.173.226 port 29864 ssh2
Dec 10 05:59:29 tux-35-217 sshd\[1975\]: Failed password for root from 222.186.173.226 port 29864 ssh2
Dec 10 05:59:33 tux-35-217 sshd\[1975\]: Failed password for root from 222.186.173.226 port 29864 ssh2
...
2019-12-10 13:04:19
192.99.245.135 attackbotsspam
Dec  9 23:59:35 plusreed sshd[7648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.245.135  user=root
Dec  9 23:59:37 plusreed sshd[7648]: Failed password for root from 192.99.245.135 port 50600 ssh2
...
2019-12-10 13:01:55
222.186.173.183 attackspambots
$f2bV_matches
2019-12-10 09:28:36
222.186.175.148 attackspam
Dec 10 00:15:33 lanister sshd[11072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
Dec 10 00:15:35 lanister sshd[11072]: Failed password for root from 222.186.175.148 port 20570 ssh2
...
2019-12-10 13:20:25
163.172.62.21 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-10 13:16:20
178.150.216.229 attackbotsspam
Dec 10 05:59:29 [host] sshd[20800]: Invalid user wakeley from 178.150.216.229
Dec 10 05:59:29 [host] sshd[20800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.150.216.229
Dec 10 05:59:32 [host] sshd[20800]: Failed password for invalid user wakeley from 178.150.216.229 port 45010 ssh2
2019-12-10 13:07:45
121.28.14.213 attack
Tue Dec 10 07:58:44 2019 [pid 32363] [anonymous] FAIL LOGIN: Client "121.28.14.213"
Tue Dec 10 07:59:20 2019 [pid 32368] [smd-m] FAIL LOGIN: Client "121.28.14.213"
Tue Dec 10 07:59:25 2019 [pid 32400] [smd-m] FAIL LOGIN: Client "121.28.14.213"
Tue Dec 10 07:59:31 2019 [pid 32403] [www] FAIL LOGIN: Client "121.28.14.213"
Tue Dec 10 07:59:37 2019 [pid 32408] [www] FAIL LOGIN: Client "121.28.14.213"
...
2019-12-10 13:02:26
149.56.96.78 attack
Dec 10 02:15:02 OPSO sshd\[30194\]: Invalid user satyr123 from 149.56.96.78 port 40642
Dec 10 02:15:02 OPSO sshd\[30194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.96.78
Dec 10 02:15:04 OPSO sshd\[30194\]: Failed password for invalid user satyr123 from 149.56.96.78 port 40642 ssh2
Dec 10 02:20:30 OPSO sshd\[32526\]: Invalid user 50cent from 149.56.96.78 port 41222
Dec 10 02:20:30 OPSO sshd\[32526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.96.78
2019-12-10 09:32:02
121.164.122.134 attackspambots
Dec  9 01:52:45 lamijardin sshd[19832]: Invalid user comrades from 121.164.122.134
Dec  9 01:52:45 lamijardin sshd[19832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.164.122.134
Dec  9 01:52:48 lamijardin sshd[19832]: Failed password for invalid user comrades from 121.164.122.134 port 48554 ssh2
Dec  9 01:52:48 lamijardin sshd[19832]: Received disconnect from 121.164.122.134 port 48554:11: Bye Bye [preauth]
Dec  9 01:52:48 lamijardin sshd[19832]: Disconnected from 121.164.122.134 port 48554 [preauth]
Dec  9 02:01:24 lamijardin sshd[19850]: Invalid user denis from 121.164.122.134
Dec  9 02:01:24 lamijardin sshd[19850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.164.122.134
Dec  9 02:01:26 lamijardin sshd[19850]: Failed password for invalid user denis from 121.164.122.134 port 60238 ssh2
Dec  9 02:01:26 lamijardin sshd[19850]: Received disconnect from 121.164.122.134 port 602........
-------------------------------
2019-12-10 09:21:38
222.112.107.46 attack
12/09/2019-18:14:24.038777 222.112.107.46 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-10 09:32:19
91.126.27.80 attackspam
Automatic report - Port Scan Attack
2019-12-10 13:09:07
210.5.88.19 attack
Dec 10 01:09:37 web8 sshd\[17055\]: Invalid user sacil from 210.5.88.19
Dec 10 01:09:37 web8 sshd\[17055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.5.88.19
Dec 10 01:09:40 web8 sshd\[17055\]: Failed password for invalid user sacil from 210.5.88.19 port 54392 ssh2
Dec 10 01:15:51 web8 sshd\[20080\]: Invalid user admin from 210.5.88.19
Dec 10 01:15:51 web8 sshd\[20080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.5.88.19
2019-12-10 09:32:51

Recently Reported IPs

208.90.251.255 143.152.166.170 143.93.112.195 137.36.131.157
92.42.69.92 154.75.157.23 78.23.13.184 166.59.100.131
104.116.127.220 164.166.81.6 68.216.48.77 145.55.196.37
31.224.47.131 63.145.187.129 14.125.154.158 229.72.226.157
145.8.189.12 165.230.44.24 29.29.14.16 221.71.229.113