Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.22.167.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59560
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.22.167.149.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 14:21:45 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 149.167.22.245.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.167.22.245.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.89.139.228 attack
Sep 14 16:52:27 itv-usvr-01 sshd[1686]: Invalid user 1234567890 from 159.89.139.228
Sep 14 16:52:27 itv-usvr-01 sshd[1686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.139.228
Sep 14 16:52:27 itv-usvr-01 sshd[1686]: Invalid user 1234567890 from 159.89.139.228
Sep 14 16:52:28 itv-usvr-01 sshd[1686]: Failed password for invalid user 1234567890 from 159.89.139.228 port 35386 ssh2
Sep 14 16:56:20 itv-usvr-01 sshd[2115]: Invalid user scandmar from 159.89.139.228
2019-09-18 02:41:52
197.210.53.114 attackbots
Unauthorized connection attempt from IP address 197.210.53.114 on Port 445(SMB)
2019-09-18 02:52:22
93.147.167.130 attack
Unauthorized connection attempt from IP address 93.147.167.130 on Port 445(SMB)
2019-09-18 02:38:14
133.167.106.31 attack
Automated report - ssh fail2ban:
Sep 17 19:52:13 authentication failure 
Sep 17 19:52:15 wrong password, user=public, port=59772, ssh2
Sep 17 19:56:27 authentication failure
2019-09-18 02:22:05
124.108.51.249 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/124.108.51.249/ 
 KH - 1H : (4)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : KH 
 NAME ASN : ASN38209 
 
 IP : 124.108.51.249 
 
 CIDR : 124.108.51.0/24 
 
 PREFIX COUNT : 28 
 
 UNIQUE IP COUNT : 7424 
 
 
 WYKRYTE ATAKI Z ASN38209 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-18 03:00:06
35.220.199.231 attackbots
Sep 17 20:23:05 dedicated sshd[3767]: Invalid user sienna123 from 35.220.199.231 port 53988
2019-09-18 02:27:33
177.52.48.214 attack
proto=tcp  .  spt=51342  .  dpt=25  .     (listed on  dnsbl-sorbs abuseat-org barracuda)     (644)
2019-09-18 02:36:20
119.200.186.168 attackbotsspam
Automatic report - Banned IP Access
2019-09-18 02:55:39
183.131.82.99 attack
Sep 17 20:34:50 cvbnet sshd[4114]: Failed password for root from 183.131.82.99 port 27106 ssh2
Sep 17 20:34:52 cvbnet sshd[4114]: Failed password for root from 183.131.82.99 port 27106 ssh2
2019-09-18 02:35:13
41.39.140.178 attackbots
Unauthorized connection attempt from IP address 41.39.140.178 on Port 445(SMB)
2019-09-18 02:54:44
178.205.101.68 attack
Unauthorized connection attempt from IP address 178.205.101.68 on Port 445(SMB)
2019-09-18 02:11:50
206.189.204.63 attack
Sep 17 17:34:27 ns41 sshd[10199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.204.63
2019-09-18 02:50:28
49.235.79.40 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/49.235.79.40/ 
 JP - 1H : (55)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : JP 
 NAME ASN : ASN45090 
 
 IP : 49.235.79.40 
 
 CIDR : 49.235.64.0/20 
 
 PREFIX COUNT : 1788 
 
 UNIQUE IP COUNT : 2600192 
 
 
 WYKRYTE ATAKI Z ASN45090 :  
  1H - 3 
  3H - 5 
  6H - 7 
 12H - 19 
 24H - 33 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-18 02:14:48
222.186.30.165 attackbotsspam
Sep 17 13:59:46 plusreed sshd[29482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.165  user=root
Sep 17 13:59:49 plusreed sshd[29482]: Failed password for root from 222.186.30.165 port 59870 ssh2
...
2019-09-18 02:13:56
37.187.0.20 attack
2019-09-17T18:47:24.222835abusebot-2.cloudsearch.cf sshd\[1269\]: Invalid user de12345 from 37.187.0.20 port 55554
2019-09-18 03:01:29

Recently Reported IPs

202.89.27.100 249.17.139.170 118.159.57.57 26.63.235.227
212.212.248.72 42.216.150.222 23.210.16.72 167.27.38.96
220.44.83.139 47.197.211.101 172.97.205.127 27.185.147.253
71.118.72.195 174.176.239.70 213.75.73.72 29.82.9.150
135.153.33.92 136.45.54.90 114.192.171.115 86.179.128.22