Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 254.149.243.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26164
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;254.149.243.194.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 13:37:53 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 194.243.149.254.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 194.243.149.254.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
42.51.217.27 attackbotsspam
30.11.2019 00:20:50 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2019-11-30 07:42:39
84.122.18.69 attack
ssh failed login
2019-11-30 07:35:37
222.186.175.182 attack
Nov 29 18:51:52 TORMINT sshd\[15522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Nov 29 18:51:53 TORMINT sshd\[15522\]: Failed password for root from 222.186.175.182 port 25490 ssh2
Nov 29 18:52:10 TORMINT sshd\[15554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
...
2019-11-30 07:53:50
106.13.139.252 attackbots
Nov 29 20:20:25 ldap01vmsma01 sshd[54072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.139.252
Nov 29 20:20:26 ldap01vmsma01 sshd[54072]: Failed password for invalid user bringaker from 106.13.139.252 port 50236 ssh2
...
2019-11-30 07:54:50
116.110.95.195 attackspambots
fail2ban
2019-11-30 07:32:44
106.52.18.180 attackbots
Nov 29 23:27:58 124388 sshd[850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.18.180
Nov 29 23:27:58 124388 sshd[850]: Invalid user marybeth from 106.52.18.180 port 57234
Nov 29 23:28:01 124388 sshd[850]: Failed password for invalid user marybeth from 106.52.18.180 port 57234 ssh2
Nov 29 23:31:05 124388 sshd[864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.18.180  user=root
Nov 29 23:31:07 124388 sshd[864]: Failed password for root from 106.52.18.180 port 33836 ssh2
2019-11-30 07:32:59
14.225.11.29 attack
RDPBruteFlS24
2019-11-30 08:00:16
183.203.96.56 attack
Nov 29 13:20:56 eddieflores sshd\[28954\]: Invalid user fiona from 183.203.96.56
Nov 29 13:20:56 eddieflores sshd\[28954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.203.96.56
Nov 29 13:20:58 eddieflores sshd\[28954\]: Failed password for invalid user fiona from 183.203.96.56 port 60914 ssh2
Nov 29 13:25:44 eddieflores sshd\[29329\]: Invalid user caryn from 183.203.96.56
Nov 29 13:25:44 eddieflores sshd\[29329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.203.96.56
2019-11-30 07:34:56
111.38.216.94 attackbots
Nov 30 04:46:58 vibhu-HP-Z238-Microtower-Workstation sshd\[25041\]: Invalid user faleesha from 111.38.216.94
Nov 30 04:46:58 vibhu-HP-Z238-Microtower-Workstation sshd\[25041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.38.216.94
Nov 30 04:47:00 vibhu-HP-Z238-Microtower-Workstation sshd\[25041\]: Failed password for invalid user faleesha from 111.38.216.94 port 44252 ssh2
Nov 30 04:51:02 vibhu-HP-Z238-Microtower-Workstation sshd\[25910\]: Invalid user admin from 111.38.216.94
Nov 30 04:51:02 vibhu-HP-Z238-Microtower-Workstation sshd\[25910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.38.216.94
...
2019-11-30 07:23:02
198.245.49.37 attack
Nov 29 13:18:03 sachi sshd\[24836\]: Invalid user eni from 198.245.49.37
Nov 29 13:18:03 sachi sshd\[24836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns514527.ip-198-245-49.net
Nov 29 13:18:06 sachi sshd\[24836\]: Failed password for invalid user eni from 198.245.49.37 port 46264 ssh2
Nov 29 13:20:58 sachi sshd\[25121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns514527.ip-198-245-49.net  user=root
Nov 29 13:21:01 sachi sshd\[25121\]: Failed password for root from 198.245.49.37 port 53700 ssh2
2019-11-30 07:26:55
189.129.106.19 attackspam
Automatic report - Port Scan Attack
2019-11-30 07:34:24
222.184.233.222 attackspambots
$f2bV_matches
2019-11-30 07:36:36
45.141.84.25 attackbots
Nov 30 00:20:28 herz-der-gamer sshd[7514]: Invalid user admin from 45.141.84.25 port 8071
...
2019-11-30 07:52:51
182.61.58.131 attack
Invalid user server from 182.61.58.131 port 53076
2019-11-30 07:20:28
27.71.232.142 attack
445/tcp 1433/tcp
[2019-10-16/11-29]2pkt
2019-11-30 07:19:36

Recently Reported IPs

138.107.102.178 46.216.164.244 30.188.39.214 215.130.127.64
83.26.52.249 184.93.183.21 188.218.77.151 75.3.182.162
30.133.187.218 106.19.14.250 239.116.60.190 157.75.205.175
247.194.23.229 192.58.91.148 211.50.6.102 41.154.225.216
121.142.188.161 142.238.23.145 119.248.117.182 130.191.159.70