Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Milan

Region: Lombardy

Country: Italy

Internet Service Provider: Fastweb

Hostname: unknown

Organization: Fastweb

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
2.229.110.184 attackspam
Automatic report - Banned IP Access
2020-06-03 04:51:03
2.229.110.184 attack
Unauthorized connection attempt detected from IP address 2.229.110.184 to port 23
2020-04-24 15:45:07
2.229.110.184 attack
Unauthorized connection attempt detected from IP address 2.229.110.184 to port 23
2020-03-29 19:57:47
2.229.119.226 attackbots
POST /editBlackAndWhiteList HTTP/1.1 404 10090 ApiTool
2020-02-03 13:37:02
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.229.11.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12501
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.229.11.149.			IN	A

;; AUTHORITY SECTION:
.			2032	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019032802 1800 900 604800 86400

;; Query time: 129 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 29 03:39:52 CST 2019
;; MSG SIZE  rcvd: 116

Host info
149.11.229.2.in-addr.arpa domain name pointer 2-229-11-149.ip194.fastwebnet.it.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
149.11.229.2.in-addr.arpa	name = 2-229-11-149.ip194.fastwebnet.it.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.215 attackspambots
Apr 27 20:35:34 ip-172-31-61-156 sshd[28162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Apr 27 20:35:36 ip-172-31-61-156 sshd[28162]: Failed password for root from 222.186.175.215 port 34324 ssh2
...
2020-04-28 04:42:54
95.249.112.169 attackbotsspam
Automatic report - Port Scan Attack
2020-04-28 04:30:51
220.163.107.130 attack
SSH bruteforce (Triggered fail2ban)
2020-04-28 04:57:12
201.221.186.113 attackspam
[ssh] SSH attack
2020-04-28 04:52:21
14.23.125.194 attack
1588018352 - 04/27/2020 22:12:32 Host: 14.23.125.194/14.23.125.194 Port: 445 TCP Blocked
2020-04-28 04:45:16
103.15.140.126 attackbots
Port probing on unauthorized port 1433
2020-04-28 04:49:06
206.189.202.165 attackspambots
k+ssh-bruteforce
2020-04-28 04:36:13
157.230.151.241 attackbotsspam
Apr 27 22:12:55 host sshd[4611]: Invalid user vivian from 157.230.151.241 port 49536
...
2020-04-28 04:27:59
114.67.235.83 attackbotsspam
Apr 27 22:09:14 mail sshd[16070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.235.83
Apr 27 22:09:17 mail sshd[16070]: Failed password for invalid user augusto from 114.67.235.83 port 40278 ssh2
Apr 27 22:12:42 mail sshd[16706]: Failed password for postgres from 114.67.235.83 port 60984 ssh2
2020-04-28 04:38:07
193.56.28.156 attack
Apr 27 22:12:37 srv01 postfix/smtpd[23294]: warning: unknown[193.56.28.156]: SASL LOGIN authentication failed: authentication failure
Apr 27 22:12:37 srv01 postfix/smtpd[23294]: warning: unknown[193.56.28.156]: SASL LOGIN authentication failed: authentication failure
Apr 27 22:12:37 srv01 postfix/smtpd[23294]: warning: unknown[193.56.28.156]: SASL LOGIN authentication failed: authentication failure
...
2020-04-28 04:43:34
212.160.213.247 attackspam
Automatic report - Port Scan Attack
2020-04-28 04:43:17
104.248.52.211 attackspambots
Apr 27 20:08:19 vlre-nyc-1 sshd\[12686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.52.211  user=root
Apr 27 20:08:21 vlre-nyc-1 sshd\[12686\]: Failed password for root from 104.248.52.211 port 59724 ssh2
Apr 27 20:12:13 vlre-nyc-1 sshd\[12763\]: Invalid user ubuntu from 104.248.52.211
Apr 27 20:12:13 vlre-nyc-1 sshd\[12763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.52.211
Apr 27 20:12:16 vlre-nyc-1 sshd\[12763\]: Failed password for invalid user ubuntu from 104.248.52.211 port 44260 ssh2
...
2020-04-28 05:01:16
111.249.105.85 attackbots
Port probing on unauthorized port 23098
2020-04-28 04:57:36
88.247.194.52 attackspam
Automatic report - Banned IP Access
2020-04-28 04:33:07
213.166.68.106 attack
04/27/2020-16:42:37.838267 213.166.68.106 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-28 04:49:34

Recently Reported IPs

5.20.151.152 202.47.57.17 134.175.225.94 210.4.64.57
200.54.51.126 148.70.210.31 91.206.14.191 71.202.247.159
103.9.159.59 81.22.45.134 51.255.174.164 185.232.30.67
80.82.70.198 78.186.161.192 159.65.109.148 122.228.19.80
78.111.248.100 167.99.199.157 60.169.77.183 52.234.149.58