Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Reserved

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 240.134.19.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8197
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;240.134.19.149.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081900 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Aug 19 23:46:08 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 149.19.134.240.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 149.19.134.240.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
189.229.94.38 attack
Icarus honeypot on github
2020-09-08 17:33:09
128.14.152.42 attackbots
 TCP (SYN) 128.14.152.42:26691 -> port 8080, len 40
2020-09-08 17:12:08
184.168.46.118 attackbots
Automatic report - XMLRPC Attack
2020-09-08 17:17:50
49.235.99.209 attackspambots
Lines containing failures of 49.235.99.209 (max 1000)
Sep  7 03:53:33 archiv sshd[6557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.99.209  user=r.r
Sep  7 03:53:36 archiv sshd[6557]: Failed password for r.r from 49.235.99.209 port 56642 ssh2
Sep  7 03:53:36 archiv sshd[6557]: Received disconnect from 49.235.99.209 port 56642:11: Bye Bye [preauth]
Sep  7 03:53:36 archiv sshd[6557]: Disconnected from 49.235.99.209 port 56642 [preauth]
Sep  7 04:05:51 archiv sshd[6699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.99.209  user=r.r
Sep  7 04:05:53 archiv sshd[6699]: Failed password for r.r from 49.235.99.209 port 52180 ssh2
Sep  7 04:05:53 archiv sshd[6699]: Received disconnect from 49.235.99.209 port 52180:11: Bye Bye [preauth]
Sep  7 04:05:53 archiv sshd[6699]: Disconnected from 49.235.99.209 port 52180 [preauth]
Sep  7 04:08:49 archiv sshd[6741]: pam_unix(sshd:auth): aut........
------------------------------
2020-09-08 17:37:29
181.114.110.5 attackspam
Honeypot attack, port: 445, PTR: SCZ-181-114-110-00005.tigo.bo.
2020-09-08 17:49:36
94.142.244.16 attackbotsspam
2020-09-08T08:38:40.738079abusebot-8.cloudsearch.cf sshd[21599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor-exit.vrij-heid.nl  user=root
2020-09-08T08:38:42.631179abusebot-8.cloudsearch.cf sshd[21599]: Failed password for root from 94.142.244.16 port 14147 ssh2
2020-09-08T08:38:44.394352abusebot-8.cloudsearch.cf sshd[21599]: Failed password for root from 94.142.244.16 port 14147 ssh2
2020-09-08T08:38:40.738079abusebot-8.cloudsearch.cf sshd[21599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor-exit.vrij-heid.nl  user=root
2020-09-08T08:38:42.631179abusebot-8.cloudsearch.cf sshd[21599]: Failed password for root from 94.142.244.16 port 14147 ssh2
2020-09-08T08:38:44.394352abusebot-8.cloudsearch.cf sshd[21599]: Failed password for root from 94.142.244.16 port 14147 ssh2
2020-09-08T08:38:40.738079abusebot-8.cloudsearch.cf sshd[21599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui
...
2020-09-08 17:47:23
41.93.32.88 attack
41.93.32.88 (TZ/Tanzania/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep  8 04:43:23 jbs1 sshd[6211]: Failed password for root from 41.93.32.88 port 57794 ssh2
Sep  8 04:30:50 jbs1 sshd[31392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.164.58.165  user=root
Sep  8 04:30:52 jbs1 sshd[31392]: Failed password for root from 180.164.58.165 port 42506 ssh2
Sep  8 04:42:40 jbs1 sshd[5940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.89.225  user=root
Sep  8 04:42:42 jbs1 sshd[5940]: Failed password for root from 165.22.89.225 port 16401 ssh2
Sep  8 04:32:55 jbs1 sshd[32670]: Failed password for root from 137.74.132.171 port 39358 ssh2

IP Addresses Blocked:
2020-09-08 17:15:32
81.129.253.102 attackspam
Automatic report - Port Scan Attack
2020-09-08 17:27:44
197.159.215.249 attackspambots
Lines containing failures of 197.159.215.249
Sep  7 17:30:12 shared02 sshd[4155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.159.215.249  user=r.r
Sep  7 17:30:14 shared02 sshd[4155]: Failed password for r.r from 197.159.215.249 port 56501 ssh2
Sep  7 17:30:15 shared02 sshd[4155]: Received disconnect from 197.159.215.249 port 56501:11: Bye Bye [preauth]
Sep  7 17:30:15 shared02 sshd[4155]: Disconnected from authenticating user r.r 197.159.215.249 port 56501 [preauth]
Sep  7 17:51:02 shared02 sshd[12864]: Connection closed by 197.159.215.249 port 51161 [preauth]
Sep  7 18:01:10 shared02 sshd[16264]: Invalid user sk from 197.159.215.249 port 39792
Sep  7 18:01:10 shared02 sshd[16264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.159.215.249
Sep  7 18:01:12 shared02 sshd[16264]: Failed password for invalid user sk from 197.159.215.249 port 39792 ssh2
Sep  7 18:01:13 shared02 sshd........
------------------------------
2020-09-08 17:13:26
112.118.50.142 attackspambots
Honeypot attack, port: 5555, PTR: n11211850142.netvigator.com.
2020-09-08 17:23:06
213.87.102.18 attack
Honeypot attack, port: 445, PTR: service-18.mrdv-7.mtsnet.ru.
2020-09-08 17:43:35
118.27.11.126 attackspam
2020-09-08T09:41:17.286035shield sshd\[16086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v118-27-11-126.mtmf.static.cnode.io  user=root
2020-09-08T09:41:19.286399shield sshd\[16086\]: Failed password for root from 118.27.11.126 port 41890 ssh2
2020-09-08T09:45:06.194713shield sshd\[16408\]: Invalid user admin from 118.27.11.126 port 46528
2020-09-08T09:45:06.203813shield sshd\[16408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v118-27-11-126.mtmf.static.cnode.io
2020-09-08T09:45:08.312332shield sshd\[16408\]: Failed password for invalid user admin from 118.27.11.126 port 46528 ssh2
2020-09-08 17:48:21
88.132.109.164 attack
Sep  8 07:51:07 root sshd[8902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.132.109.164 
...
2020-09-08 17:39:26
212.64.71.254 attack
Sep  8 09:45:22 root sshd[1038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.71.254 
...
2020-09-08 17:49:09
222.186.30.35 attackspam
Brute-force attempt banned
2020-09-08 17:28:51

Recently Reported IPs

119.49.75.149 177.23.74.155 66.167.225.253 45.89.117.83
167.71.220.209 175.96.68.170 104.75.25.192 144.183.198.138
71.89.230.74 105.187.219.99 185.146.53.158 102.163.196.73
151.77.137.130 212.221.213.174 88.114.190.67 180.170.50.3
189.136.138.25 81.244.91.118 150.15.128.151 190.81.18.232