Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Des Moines

Region: Iowa

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.40.249.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28710
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;20.40.249.149.			IN	A

;; AUTHORITY SECTION:
.			117	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010901 1800 900 604800 86400

;; Query time: 145 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 10 05:26:06 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 149.249.40.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.249.40.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
172.69.70.185 attackspambots
SQL injection:/newsites/free/pierre/search/searchSVI.php?continentName=EU+-6863+union+all+select+1,1,CONCAT(0x3a6f79753a,0x4244764877697569706b,0x3a70687a3a)1%23&country=276+&prj_typ=all&startdate=&enddate=&from=&page=1&searchSubmission=Recherche
2020-02-05 01:27:31
180.76.54.158 attack
Feb  4 16:52:57 lnxmysql61 sshd[1276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.54.158
2020-02-05 01:31:15
138.68.130.170 attack
2019-05-08 05:52:28 1hODd6-0003iE-9v SMTP connection from \(group.lettherebecams.icu\) \[138.68.130.170\]:43633 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-05-08 05:55:55 1hODgR-0003nd-1C SMTP connection from \(wellmade.lettherebecams.icu\) \[138.68.130.170\]:40867 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-05-08 05:56:09 1hODge-0003nw-RT SMTP connection from \(quickest.lettherebecams.icu\) \[138.68.130.170\]:44059 I=\[193.107.90.29\]:25 closed by DROP in ACL
...
2020-02-05 01:16:36
138.68.142.122 attack
2019-05-07 11:08:35 1hNw5T-0007K7-NU SMTP connection from jeans.bridgecoaa.com \(null.technoandy.icu\) \[138.68.142.122\]:41731 I=\[193.107.90.29\]:25 closed by DROP in ACL
2019-05-07 11:09:14 1hNw66-0007Mr-Kd SMTP connection from jeans.bridgecoaa.com \(cats.technoandy.icu\) \[138.68.142.122\]:51735 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-05-07 11:10:28 1hNw7I-0007Py-G4 SMTP connection from jeans.bridgecoaa.com \(shaken.technoandy.icu\) \[138.68.142.122\]:56823 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-05 01:13:30
112.1.64.254 attackspambots
Unauthorized connection attempt detected from IP address 112.1.64.254 to port 2220 [J]
2020-02-05 01:03:53
136.233.44.2 attackspambots
2019-10-23 21:24:15 1iNMEx-0006TF-7i SMTP connection from \(\[136.233.44.2\]\) \[136.233.44.2\]:10748 I=\[193.107.90.29\]:25 closed by DROP in ACL
2019-10-23 21:24:34 1iNMFF-0006Td-Va SMTP connection from \(\[136.233.44.2\]\) \[136.233.44.2\]:10877 I=\[193.107.90.29\]:25 closed by DROP in ACL
2019-10-23 21:24:42 1iNMFN-0006Tv-SQ SMTP connection from \(\[136.233.44.2\]\) \[136.233.44.2\]:10952 I=\[193.107.90.29\]:25 closed by DROP in ACL
...
2020-02-05 01:24:08
138.68.133.161 attackbots
2019-05-07 14:01:13 1hNymX-0003t1-J3 SMTP connection from wail.bridgecoaa.com \(sombrero.saudecolastrina.icu\) \[138.68.133.161\]:55146 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-05-07 14:01:13 1hNymX-0003t0-J4 SMTP connection from wail.bridgecoaa.com \(ecology.saudecolastrina.icu\) \[138.68.133.161\]:33983 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-05-07 14:03:34 1hNyoo-0003vx-Qj SMTP connection from wail.bridgecoaa.com \(stitch.saudecolastrina.icu\) \[138.68.133.161\]:47804 I=\[193.107.90.29\]:25 closed by DROP in ACL
...
2020-02-05 01:15:36
106.54.126.63 attackbotsspam
Feb  4 17:55:28 lukav-desktop sshd\[4975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.126.63  user=root
Feb  4 17:55:31 lukav-desktop sshd\[4975\]: Failed password for root from 106.54.126.63 port 43482 ssh2
Feb  4 17:57:32 lukav-desktop sshd\[4996\]: Invalid user bpb from 106.54.126.63
Feb  4 17:57:32 lukav-desktop sshd\[4996\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.126.63
Feb  4 17:57:34 lukav-desktop sshd\[4996\]: Failed password for invalid user bpb from 106.54.126.63 port 56780 ssh2
2020-02-05 00:53:30
106.12.25.143 attackspam
Unauthorized connection attempt detected from IP address 106.12.25.143 to port 2220 [J]
2020-02-05 01:01:47
45.32.126.7 attackspambots
Wordpress_xmlrpc_attack
2020-02-05 01:17:11
139.199.113.140 attackbotsspam
Feb  4 16:54:17 v22018076622670303 sshd\[20656\]: Invalid user weblogic from 139.199.113.140 port 37650
Feb  4 16:54:17 v22018076622670303 sshd\[20656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.113.140
Feb  4 16:54:19 v22018076622670303 sshd\[20656\]: Failed password for invalid user weblogic from 139.199.113.140 port 37650 ssh2
...
2020-02-05 01:02:58
222.186.30.167 attackbotsspam
Feb  4 17:39:56 * sshd[11253]: Failed password for root from 222.186.30.167 port 54590 ssh2
2020-02-05 00:46:46
212.227.137.191 attackspam
xmlrpc attack
2020-02-05 01:26:38
137.101.19.136 attack
2019-09-23 20:24:37 1iCT0m-0003RS-NV SMTP connection from \(\[137.101.19.136\]\) \[137.101.19.136\]:23201 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-09-23 20:24:50 1iCT0z-0003Ri-QX SMTP connection from \(\[137.101.19.136\]\) \[137.101.19.136\]:23269 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-09-23 20:25:09 1iCT16-0003Rm-3o SMTP connection from \(\[137.101.19.136\]\) \[137.101.19.136\]:23295 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-05 01:23:13
222.186.31.135 attack
Feb  4 18:22:21 dcd-gentoo sshd[9052]: User root from 222.186.31.135 not allowed because none of user's groups are listed in AllowGroups
Feb  4 18:22:24 dcd-gentoo sshd[9052]: error: PAM: Authentication failure for illegal user root from 222.186.31.135
Feb  4 18:22:21 dcd-gentoo sshd[9052]: User root from 222.186.31.135 not allowed because none of user's groups are listed in AllowGroups
Feb  4 18:22:24 dcd-gentoo sshd[9052]: error: PAM: Authentication failure for illegal user root from 222.186.31.135
Feb  4 18:22:21 dcd-gentoo sshd[9052]: User root from 222.186.31.135 not allowed because none of user's groups are listed in AllowGroups
Feb  4 18:22:24 dcd-gentoo sshd[9052]: error: PAM: Authentication failure for illegal user root from 222.186.31.135
Feb  4 18:22:24 dcd-gentoo sshd[9052]: Failed keyboard-interactive/pam for invalid user root from 222.186.31.135 port 48626 ssh2
...
2020-02-05 01:28:58

Recently Reported IPs

151.160.216.218 217.99.76.39 35.143.116.155 89.7.173.231
90.195.95.20 197.142.60.213 105.136.61.232 160.45.234.202
129.59.52.101 187.120.146.18 105.236.181.123 78.249.73.146
176.109.241.172 36.33.84.197 137.39.100.246 12.235.42.100
45.76.230.8 196.217.20.161 51.91.158.179 191.63.183.220