Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.162.146.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18178
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.162.146.149.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 17:39:03 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 149.146.162.2.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.146.162.2.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.75.122.16 attackbots
Jun 30 15:35:58 meumeu sshd[18202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.122.16 
Jun 30 15:36:01 meumeu sshd[18202]: Failed password for invalid user ascension from 51.75.122.16 port 46696 ssh2
Jun 30 15:39:15 meumeu sshd[18619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.122.16 
...
2019-07-01 00:47:00
114.113.221.162 attackspambots
frenzy
2019-07-01 01:28:30
207.154.218.16 attackbotsspam
Invalid user shane from 207.154.218.16 port 43952
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.218.16
Failed password for invalid user shane from 207.154.218.16 port 43952 ssh2
Invalid user daniele from 207.154.218.16 port 41360
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.218.16
2019-07-01 00:49:15
14.169.141.135 attackbotsspam
Jun 30 15:06:21 vps34202 sshd[8665]: Address 14.169.141.135 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jun 30 15:06:21 vps34202 sshd[8665]: Invalid user admin from 14.169.141.135
Jun 30 15:06:21 vps34202 sshd[8665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.169.141.135 
Jun 30 15:06:23 vps34202 sshd[8665]: Failed password for invalid user admin from 14.169.141.135 port 36330 ssh2
Jun 30 15:06:23 vps34202 sshd[8665]: Connection closed by 14.169.141.135 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.169.141.135
2019-07-01 00:59:58
163.204.246.6 attack
2019-06-30 15:11:04 H=(localhost.localdomain) [163.204.246.6] F=: X-DNSBL-Warning: 163.204.246.6 is listed at cbl.abuseat.org (127.0.0.2) (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=163.204.246.6)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=163.204.246.6
2019-07-01 01:20:38
222.239.78.88 attackbotsspam
" "
2019-07-01 01:28:03
159.65.243.149 attack
Banned for posting to wp-login.php without referer {"redirect_to":"","user_email":"traveltocity@zohomail.eu","user_login":"traveltocityyy","wp-submit":"Register"}
2019-07-01 01:00:32
54.153.228.29 attackbotsspam
3389BruteforceIDS
2019-07-01 00:59:37
179.127.146.140 attack
SMTP-sasl brute force
...
2019-07-01 00:53:08
81.22.45.6 attack
Jun 30 14:58:45 h2177944 kernel: \[223967.224736\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.6 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=61914 PROTO=TCP SPT=55198 DPT=3868 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 30 15:02:03 h2177944 kernel: \[224165.114097\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.6 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=59345 PROTO=TCP SPT=55198 DPT=3555 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 30 15:07:25 h2177944 kernel: \[224487.087318\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.6 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=45599 PROTO=TCP SPT=55198 DPT=3438 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 30 15:13:33 h2177944 kernel: \[224854.700051\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.6 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=31017 PROTO=TCP SPT=55198 DPT=3403 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 30 15:22:51 h2177944 kernel: \[225413.130413\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.6 DST=85.214.117.9 LEN=40 TOS=0x00 PRE
2019-07-01 01:01:04
219.92.0.57 attackspambots
RDP Bruteforce
2019-07-01 01:11:57
134.73.161.177 attackspambots
Jun 30 15:08:37 mail1 sshd[18323]: Invalid user ftp from 134.73.161.177 port 54738
Jun 30 15:08:37 mail1 sshd[18323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.73.161.177
Jun 30 15:08:39 mail1 sshd[18323]: Failed password for invalid user ftp from 134.73.161.177 port 54738 ssh2
Jun 30 15:08:39 mail1 sshd[18323]: Received disconnect from 134.73.161.177 port 54738:11: Bye Bye [preauth]
Jun 30 15:08:39 mail1 sshd[18323]: Disconnected from 134.73.161.177 port 54738 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=134.73.161.177
2019-07-01 01:16:56
187.32.254.203 attackspambots
Jun 30 14:20:33 *** sshd[28983]: reveeclipse mapping checking getaddrinfo for 187-032-254-203.static.ctbctelecom.com.br [187.32.254.203] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 30 14:20:33 *** sshd[28983]: Invalid user minecraft from 187.32.254.203
Jun 30 14:20:33 *** sshd[28983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.32.254.203 
Jun 30 14:20:35 *** sshd[28983]: Failed password for invalid user minecraft from 187.32.254.203 port 56776 ssh2
Jun 30 14:20:35 *** sshd[28983]: Received disconnect from 187.32.254.203: 11: Bye Bye [preauth]
Jun 30 14:23:37 *** sshd[29207]: reveeclipse mapping checking getaddrinfo for 187-032-254-203.static.ctbctelecom.com.br [187.32.254.203] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 30 14:23:37 *** sshd[29207]: Invalid user dpi from 187.32.254.203
Jun 30 14:23:37 *** sshd[29207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.32.254.203 
Jun 30 14:........
-------------------------------
2019-07-01 00:55:48
191.53.221.77 attackbots
Jun 30 09:22:02 web1 postfix/smtpd[24162]: warning: unknown[191.53.221.77]: SASL PLAIN authentication failed: authentication failure
...
2019-07-01 01:22:33
193.70.33.75 attackspambots
Jun 30 15:20:22 lnxded64 sshd[7839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.33.75
Jun 30 15:20:24 lnxded64 sshd[7839]: Failed password for invalid user nagios from 193.70.33.75 port 48810 ssh2
Jun 30 15:22:36 lnxded64 sshd[8344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.33.75
2019-07-01 01:07:57

Recently Reported IPs

250.145.29.73 223.117.132.129 194.214.144.17 24.37.229.64
12.71.17.41 13.126.158.230 139.239.111.99 24.43.91.62
101.43.242.197 253.38.100.167 150.19.123.21 94.215.157.228
245.164.221.191 143.184.233.124 251.39.11.131 101.239.24.39
243.29.40.215 96.252.80.224 21.198.87.31 78.108.244.145