Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.149.168.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19583
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.149.168.22.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091401 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 15 02:07:56 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 22.168.149.220.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 22.168.149.220.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.15.230 attackbotsspam
Dec 11 10:39:43 woltan sshd[1926]: Failed password for invalid user laural from 106.12.15.230 port 39606 ssh2
2020-04-13 21:53:12
178.162.203.241 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/178.162.203.241/ 
 
 DE - 1H : (5)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : DE 
 NAME ASN : ASN28753 
 
 IP : 178.162.203.241 
 
 CIDR : 178.162.192.0/18 
 
 PREFIX COUNT : 27 
 
 UNIQUE IP COUNT : 82432 
 
 
 ATTACKS DETECTED ASN28753 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2020-04-13 10:41:55 
 
 INFO : Looking for resource vulnerabilities 403 Detected and Blocked by ADMIN  - data recovery
2020-04-13 21:50:56
162.243.129.115 attackspam
[portscan] tcp/22 [SSH]
*(RWIN=65535)(04131106)
2020-04-13 22:10:08
187.0.211.99 attackspambots
Invalid user admin from 187.0.211.99 port 55020
2020-04-13 21:46:49
58.152.43.73 attack
SSH login attempts.
2020-04-13 22:05:26
167.172.152.143 attackspam
Report Port Scan: Events[1] countPorts[1]: 12448 ..
2020-04-13 22:06:17
78.72.255.234 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-13 22:01:27
118.89.118.103 attackbots
[ssh] SSH attack
2020-04-13 21:33:07
118.70.117.156 attackbotsspam
Unauthorized connection attempt detected from IP address 118.70.117.156 to port 23 [T]
2020-04-13 22:11:42
180.242.223.225 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-13 21:58:30
37.49.225.166 attack
30120/udp 3478/udp 5060/udp...
[2020-02-12/04-13]241pkt,2pt.(tcp),16pt.(udp)
2020-04-13 22:12:02
157.230.2.208 attack
$f2bV_matches
2020-04-13 21:39:49
2.82.166.62 attack
Brute force attempt
2020-04-13 21:55:27
216.218.206.121 attackbotsspam
Report Port Scan: Events[1] countPorts[1]: 1434 ..
2020-04-13 22:05:47
114.98.238.230 attackbots
Apr 13 15:25:59 OPSO sshd\[32130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.98.238.230  user=root
Apr 13 15:26:01 OPSO sshd\[32130\]: Failed password for root from 114.98.238.230 port 59058 ssh2
Apr 13 15:29:30 OPSO sshd\[601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.98.238.230  user=root
Apr 13 15:29:32 OPSO sshd\[601\]: Failed password for root from 114.98.238.230 port 40092 ssh2
Apr 13 15:33:20 OPSO sshd\[1596\]: Invalid user pentaho from 114.98.238.230 port 49364
Apr 13 15:33:20 OPSO sshd\[1596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.98.238.230
2020-04-13 21:35:38

Recently Reported IPs

221.131.34.170 180.120.213.233 77.83.24.73 83.254.90.131
61.197.55.120 45.172.41.17 156.238.7.213 114.239.150.91
185.85.37.134 104.28.217.213 195.135.17.107 201.63.44.189
158.69.189.99 43.155.113.49 193.203.10.87 154.209.125.60
220.81.174.224 191.19.226.212 176.116.230.190 196.118.231.206