Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 246.223.1.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2917
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;246.223.1.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011200 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 12 16:47:51 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 149.1.223.246.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.1.223.246.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
170.106.33.94 attackbots
$f2bV_matches
2020-10-06 18:00:20
121.40.212.94 attack
DATE:2020-10-06 08:39:11, IP:121.40.212.94, PORT:ssh SSH brute force auth (docker-dc)
2020-10-06 18:00:50
49.233.140.233 attackbots
SSH login attempts.
2020-10-06 17:38:00
83.103.98.211 attackspambots
Invalid user upload from 83.103.98.211 port 18210
2020-10-06 17:36:52
89.237.22.143 attackspam
445/tcp
[2020-10-05]1pkt
2020-10-06 17:41:13
111.229.27.180 attackspambots
" "
2020-10-06 17:23:28
200.199.26.174 attack
1601930357 - 10/05/2020 22:39:17 Host: 200.199.26.174/200.199.26.174 Port: 445 TCP Blocked
...
2020-10-06 17:21:16
182.61.25.229 attackspambots
SSH login attempts.
2020-10-06 17:23:13
96.78.158.107 attackbots
23/tcp
[2020-10-05]1pkt
2020-10-06 17:57:14
96.239.37.123 attack
Oct  6 10:22:10 con01 sshd[3921171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.239.37.123 
Oct  6 10:22:10 con01 sshd[3921171]: Invalid user test from 96.239.37.123 port 47252
Oct  6 10:22:12 con01 sshd[3921171]: Failed password for invalid user test from 96.239.37.123 port 47252 ssh2
Oct  6 10:23:22 con01 sshd[3923623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.239.37.123  user=root
Oct  6 10:23:24 con01 sshd[3923623]: Failed password for root from 96.239.37.123 port 52248 ssh2
...
2020-10-06 17:19:38
220.88.1.208 attackspambots
Invalid user tt from 220.88.1.208 port 48406
2020-10-06 17:39:51
191.241.233.131 attackbotsspam
445/tcp
[2020-10-05]1pkt
2020-10-06 17:35:31
77.106.112.106 attack
445/tcp
[2020-10-05]1pkt
2020-10-06 18:01:29
120.78.11.170 attack
T: f2b ssh aggressive 3x
2020-10-06 18:01:15
223.231.124.99 attack
1601930345 - 10/05/2020 22:39:05 Host: 223.231.124.99/223.231.124.99 Port: 445 TCP Blocked
2020-10-06 17:38:27

Recently Reported IPs

180.141.4.105 21.205.202.47 119.53.189.254 106.240.169.99
103.214.168.126 127.2.12.140 187.208.235.122 224.184.83.13
62.89.41.167 107.209.17.197 141.184.105.31 194.81.244.132
74.161.176.207 62.66.228.22 88.70.23.167 58.96.199.0
101.142.247.33 64.99.11.166 180.211.182.54 181.183.203.18