Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hamburg

Region: Free and Hanseatic City of Hamburg

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.16.194.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60818
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.16.194.149.			IN	A

;; AUTHORITY SECTION:
.			326	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021500 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 15 19:01:19 CST 2022
;; MSG SIZE  rcvd: 105
Host info
149.194.16.2.in-addr.arpa domain name pointer a2-16-194-149.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.194.16.2.in-addr.arpa	name = a2-16-194-149.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
42.226.94.190 attackbots
scan z
2019-11-13 08:26:00
185.117.118.187 attackbots
\[2019-11-12 19:14:58\] NOTICE\[2601\] chan_sip.c: Registration from '\' failed for '185.117.118.187:49195' - Wrong password
\[2019-11-12 19:14:58\] SECURITY\[2634\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-12T19:14:58.355-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="38098",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.117.118.187/49195",Challenge="66356612",ReceivedChallenge="66356612",ReceivedHash="10493ab2d975f349845e8ec351f9f08e"
\[2019-11-12 19:16:35\] NOTICE\[2601\] chan_sip.c: Registration from '\' failed for '185.117.118.187:50404' - Wrong password
\[2019-11-12 19:16:35\] SECURITY\[2634\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-12T19:16:35.154-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="30619",SessionID="0x7fdf2c797b18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP
2019-11-13 08:29:39
61.163.190.49 attackspambots
SSH-BruteForce
2019-11-13 08:42:51
156.198.138.191 attack
MYH,DEF GET /downloader/
2019-11-13 08:46:06
188.131.136.36 attackbots
Nov 13 01:19:13 mail sshd[17958]: Invalid user vps from 188.131.136.36
Nov 13 01:19:13 mail sshd[17958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.136.36
Nov 13 01:19:13 mail sshd[17958]: Invalid user vps from 188.131.136.36
Nov 13 01:19:15 mail sshd[17958]: Failed password for invalid user vps from 188.131.136.36 port 33488 ssh2
Nov 13 01:49:00 mail sshd[21604]: Invalid user akins from 188.131.136.36
...
2019-11-13 08:49:48
81.171.85.101 attack
\[2019-11-12 19:19:11\] NOTICE\[2601\] chan_sip.c: Registration from '\' failed for '81.171.85.101:59809' - Wrong password
\[2019-11-12 19:19:11\] SECURITY\[2634\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-12T19:19:11.980-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="4214",SessionID="0x7fdf2c797b18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.171.85.101/59809",Challenge="17554977",ReceivedChallenge="17554977",ReceivedHash="0a191d853e53e0c37cf53cd0620c3ff2"
\[2019-11-12 19:19:43\] NOTICE\[2601\] chan_sip.c: Registration from '\' failed for '81.171.85.101:55661' - Wrong password
\[2019-11-12 19:19:43\] SECURITY\[2634\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-12T19:19:43.273-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="8077",SessionID="0x7fdf2c3f5928",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.171.85
2019-11-13 08:33:27
81.22.45.48 attackspambots
2019-11-13T01:20:20.940193+01:00 lumpi kernel: [3426797.310229] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.48 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=50219 PROTO=TCP SPT=40318 DPT=3345 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-13 08:22:13
195.88.17.13 attack
Automatic report - Port Scan Attack
2019-11-13 08:42:03
139.59.161.78 attackbots
Nov 13 00:09:04 localhost sshd\[28202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.161.78  user=root
Nov 13 00:09:06 localhost sshd\[28202\]: Failed password for root from 139.59.161.78 port 33619 ssh2
Nov 13 00:27:34 localhost sshd\[28578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.161.78  user=root
...
2019-11-13 08:32:50
95.111.59.210 attack
2019-11-12T23:44:13.028356abusebot-3.cloudsearch.cf sshd\[30436\]: Invalid user pi from 95.111.59.210 port 52718
2019-11-13 08:48:07
91.121.103.175 attackbots
Nov 12 23:11:14 sshgateway sshd\[14053\]: Invalid user sasi from 91.121.103.175
Nov 12 23:11:14 sshgateway sshd\[14053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.103.175
Nov 12 23:11:16 sshgateway sshd\[14053\]: Failed password for invalid user sasi from 91.121.103.175 port 54924 ssh2
2019-11-13 08:24:28
5.188.84.19 attackbotsspam
[portscan] Port scan
2019-11-13 08:18:52
157.245.143.80 attackspambots
Web App Attack
2019-11-13 08:21:44
159.192.144.203 attackspam
Nov 13 02:05:47 sauna sshd[166719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.144.203
Nov 13 02:05:49 sauna sshd[166719]: Failed password for invalid user mebrahtu from 159.192.144.203 port 58984 ssh2
...
2019-11-13 08:31:10
201.55.199.143 attackbotsspam
Nov 12 12:50:24 hpm sshd\[30056\]: Invalid user hlobil from 201.55.199.143
Nov 12 12:50:24 hpm sshd\[30056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.55.199.143
Nov 12 12:50:26 hpm sshd\[30056\]: Failed password for invalid user hlobil from 201.55.199.143 port 52662 ssh2
Nov 12 12:58:49 hpm sshd\[30749\]: Invalid user pressley from 201.55.199.143
Nov 12 12:58:49 hpm sshd\[30749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.55.199.143
2019-11-13 08:54:21

Recently Reported IPs

57.143.128.200 243.249.36.172 69.241.60.137 234.114.161.140
251.52.167.111 54.39.24.244 198.132.118.86 232.204.146.246
136.219.117.197 195.41.49.98 5.26.127.115 239.162.15.41
185.12.237.39 99.15.254.221 56.201.198.18 252.207.79.180
0.73.130.62 24.250.202.222 80.188.175.211 199.88.122.183