Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Plaquemine

Region: Louisiana

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Meriplex Communications, Ltd.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.23.209.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16166
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;216.23.209.149.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 01 20:30:23 CST 2019
;; MSG SIZE  rcvd: 118

Host info
149.209.23.216.in-addr.arpa domain name pointer host-216-23-209-149.static.meriplex.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
149.209.23.216.in-addr.arpa	name = host-216-23-209-149.static.meriplex.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
119.90.61.10 attackspambots
...
2020-04-16 05:07:14
87.251.74.9 attackspambots
Port Scan: Events[1] countPorts[1]: 3151 ..
2020-04-16 05:16:57
185.151.242.184 attack
Port Scan: Events[2] countPorts[2]: 3389 4444 ..
2020-04-16 05:03:32
125.22.9.186 attackspambots
Apr 15 22:38:17 markkoudstaal sshd[5927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.22.9.186
Apr 15 22:38:18 markkoudstaal sshd[5927]: Failed password for invalid user ftpuser from 125.22.9.186 port 36527 ssh2
Apr 15 22:42:27 markkoudstaal sshd[6596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.22.9.186
2020-04-16 04:51:44
182.180.128.134 attackspambots
Apr 15 15:08:11 server1 sshd\[22680\]: Failed password for root from 182.180.128.134 port 44166 ssh2
Apr 15 15:12:16 server1 sshd\[24059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.180.128.134  user=ubuntu
Apr 15 15:12:18 server1 sshd\[24059\]: Failed password for ubuntu from 182.180.128.134 port 51656 ssh2
Apr 15 15:16:30 server1 sshd\[25352\]: Invalid user osm from 182.180.128.134
Apr 15 15:16:30 server1 sshd\[25352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.180.128.134 
...
2020-04-16 05:24:34
146.66.244.246 attackspambots
Apr 15 22:11:13 server sshd[54073]: Failed password for invalid user suwit from 146.66.244.246 port 51488 ssh2
Apr 15 22:22:02 server sshd[56937]: Failed password for invalid user testuser1 from 146.66.244.246 port 56046 ssh2
Apr 15 22:25:46 server sshd[58077]: Failed password for invalid user mn from 146.66.244.246 port 35146 ssh2
2020-04-16 04:58:33
106.13.93.199 attackspambots
Apr 15 23:36:10 Enigma sshd[15523]: Invalid user cvsuser from 106.13.93.199 port 33764
Apr 15 23:36:10 Enigma sshd[15523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.93.199
Apr 15 23:36:10 Enigma sshd[15523]: Invalid user cvsuser from 106.13.93.199 port 33764
Apr 15 23:36:12 Enigma sshd[15523]: Failed password for invalid user cvsuser from 106.13.93.199 port 33764 ssh2
Apr 15 23:39:36 Enigma sshd[15716]: Invalid user kodi from 106.13.93.199 port 57610
2020-04-16 05:01:17
138.68.250.76 attackspam
Port Scan: Events[2] countPorts[2]: 9424 9425 ..
2020-04-16 05:19:19
156.96.148.33 attack
DATE:2020-04-15 22:25:41, IP:156.96.148.33, PORT:ssh SSH brute force auth (docker-dc)
2020-04-16 05:10:28
51.91.212.81 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 36 - port: 111 proto: TCP cat: Misc Attack
2020-04-16 05:06:27
49.88.112.65 attackbotsspam
Apr 15 23:00:00 vps sshd[529795]: Failed password for root from 49.88.112.65 port 59700 ssh2
Apr 15 23:00:02 vps sshd[529795]: Failed password for root from 49.88.112.65 port 59700 ssh2
Apr 15 23:00:04 vps sshd[529795]: Failed password for root from 49.88.112.65 port 59700 ssh2
Apr 15 23:00:56 vps sshd[538703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Apr 15 23:00:58 vps sshd[538703]: Failed password for root from 49.88.112.65 port 50510 ssh2
...
2020-04-16 05:20:15
34.92.31.13 attack
Apr 15 22:45:30 debian-2gb-nbg1-2 kernel: \[9242514.489783\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=34.92.31.13 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=231 ID=14095 PROTO=TCP SPT=55343 DPT=20903 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-16 04:52:37
138.68.40.92 attack
Apr 15 02:42:10 nandi sshd[25420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.40.92  user=r.r
Apr 15 02:42:12 nandi sshd[25420]: Failed password for r.r from 138.68.40.92 port 52946 ssh2
Apr 15 02:42:12 nandi sshd[25420]: Received disconnect from 138.68.40.92: 11: Bye Bye [preauth]
Apr 15 02:54:20 nandi sshd[30167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.40.92  user=r.r
Apr 15 02:54:22 nandi sshd[30167]: Failed password for r.r from 138.68.40.92 port 56216 ssh2
Apr 15 02:54:22 nandi sshd[30167]: Received disconnect from 138.68.40.92: 11: Bye Bye [preauth]
Apr 15 02:57:58 nandi sshd[32048]: Invalid user bocloud from 138.68.40.92
Apr 15 02:57:58 nandi sshd[32048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.40.92 
Apr 15 02:58:00 nandi sshd[32048]: Failed password for invalid user bocloud from 138.68.40.92 port 3959........
-------------------------------
2020-04-16 05:15:39
162.243.133.219 attackbotsspam
Port Scan: Events[2] countPorts[2]: 443 990 ..
2020-04-16 05:06:01
92.63.194.95 attack
Port Scan: Events[2] countPorts[1]: 22 ..
2020-04-16 04:58:49

Recently Reported IPs

99.249.133.142 31.179.227.61 175.182.180.154 165.164.20.174
66.42.59.237 167.212.8.62 173.184.160.212 207.231.78.134
219.165.178.51 160.3.88.164 217.39.162.180 104.209.214.236
103.213.115.249 98.221.155.44 120.80.40.10 208.89.141.200
71.196.133.53 169.60.160.29 75.236.97.204 71.62.193.38