Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.27.149.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40818
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.27.149.148.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042801 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon Apr 29 03:56:08 +08 2019
;; MSG SIZE  rcvd: 117

Host info
Host 148.149.27.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 148.149.27.45.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
149.202.206.206 attackspambots
Sep 30 03:09:00 hanapaa sshd\[19355\]: Invalid user bng7 from 149.202.206.206
Sep 30 03:09:00 hanapaa sshd\[19355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3034894.ip-149-202-206.eu
Sep 30 03:09:02 hanapaa sshd\[19355\]: Failed password for invalid user bng7 from 149.202.206.206 port 55945 ssh2
Sep 30 03:12:37 hanapaa sshd\[19781\]: Invalid user webmaster from 149.202.206.206
Sep 30 03:12:37 hanapaa sshd\[19781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3034894.ip-149-202-206.eu
2019-09-30 21:33:18
46.49.125.119 attackbotsspam
445/tcp 445/tcp 445/tcp
[2019-08-24/09-30]3pkt
2019-09-30 21:52:21
61.190.124.188 attackspambots
37215/tcp 23/tcp...
[2019-08-02/09-29]32pkt,2pt.(tcp)
2019-09-30 21:44:12
65.151.157.14 attack
Sep 12 21:58:00 vtv3 sshd\[11024\]: Invalid user testtest from 65.151.157.14 port 37114
Sep 12 21:58:00 vtv3 sshd\[11024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.151.157.14
Sep 12 21:58:03 vtv3 sshd\[11024\]: Failed password for invalid user testtest from 65.151.157.14 port 37114 ssh2
Sep 12 22:03:47 vtv3 sshd\[13708\]: Invalid user testuser from 65.151.157.14 port 46050
Sep 12 22:03:47 vtv3 sshd\[13708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.151.157.14
Sep 12 22:15:30 vtv3 sshd\[19687\]: Invalid user sftpuser from 65.151.157.14 port 35680
Sep 12 22:15:30 vtv3 sshd\[19687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.151.157.14
Sep 12 22:15:32 vtv3 sshd\[19687\]: Failed password for invalid user sftpuser from 65.151.157.14 port 35680 ssh2
Sep 12 22:21:14 vtv3 sshd\[22438\]: Invalid user git from 65.151.157.14 port 44610
Sep 12 22:21:14 vtv3 sshd\[2
2019-09-30 21:20:32
106.75.8.129 attackbots
Sep 30 09:05:54 ny01 sshd[20517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.8.129
Sep 30 09:05:56 ny01 sshd[20517]: Failed password for invalid user y from 106.75.8.129 port 48356 ssh2
Sep 30 09:10:29 ny01 sshd[21267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.8.129
2019-09-30 21:43:42
221.156.61.30 attackspam
Telnet/23 MH Probe, BF, Hack -
2019-09-30 21:56:11
36.92.1.31 attackbotsspam
Automatic report - XMLRPC Attack
2019-09-30 21:44:39
106.53.66.58 attackbots
2019-09-30T09:36:19.5848871495-001 sshd\[44819\]: Failed password for invalid user vtdc from 106.53.66.58 port 47952 ssh2
2019-09-30T09:46:53.1972861495-001 sshd\[45489\]: Invalid user strand from 106.53.66.58 port 45304
2019-09-30T09:46:53.2052471495-001 sshd\[45489\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.66.58
2019-09-30T09:46:55.1688091495-001 sshd\[45489\]: Failed password for invalid user strand from 106.53.66.58 port 45304 ssh2
2019-09-30T09:50:28.2693081495-001 sshd\[45702\]: Invalid user user from 106.53.66.58 port 44428
2019-09-30T09:50:28.2783081495-001 sshd\[45702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.66.58
...
2019-09-30 22:01:42
182.176.121.129 attack
19/9/30@08:15:55: FAIL: Alarm-Intrusion address from=182.176.121.129
...
2019-09-30 21:26:32
46.105.122.127 attack
Sep 30 12:41:23 venus sshd\[26805\]: Invalid user ubnt from 46.105.122.127 port 55706
Sep 30 12:41:23 venus sshd\[26805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.122.127
Sep 30 12:41:25 venus sshd\[26805\]: Failed password for invalid user ubnt from 46.105.122.127 port 55706 ssh2
...
2019-09-30 21:59:47
213.32.21.139 attackspam
2019-09-30T09:05:22.0464521495-001 sshd\[42852\]: Invalid user polycom from 213.32.21.139 port 39130
2019-09-30T09:05:22.0564071495-001 sshd\[42852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.ip-213-32-21.eu
2019-09-30T09:05:24.1569121495-001 sshd\[42852\]: Failed password for invalid user polycom from 213.32.21.139 port 39130 ssh2
2019-09-30T09:10:28.0308211495-001 sshd\[43189\]: Invalid user murphy from 213.32.21.139 port 52476
2019-09-30T09:10:28.0339161495-001 sshd\[43189\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.ip-213-32-21.eu
2019-09-30T09:10:30.4736221495-001 sshd\[43189\]: Failed password for invalid user murphy from 213.32.21.139 port 52476 ssh2
...
2019-09-30 21:21:55
119.108.3.128 attackbots
Automated reporting of FTP Brute Force
2019-09-30 21:54:58
175.5.139.11 attackbots
Automated reporting of FTP Brute Force
2019-09-30 21:28:18
159.203.82.104 attack
Sep 30 15:28:11 dedicated sshd[14312]: Invalid user cav from 159.203.82.104 port 36161
2019-09-30 21:38:38
69.167.210.114 attack
2019-09-30T09:22:55.8177351495-001 sshd\[44025\]: Failed password for invalid user superman from 69.167.210.114 port 35848 ssh2
2019-09-30T09:40:21.9164571495-001 sshd\[45110\]: Invalid user cssserver from 69.167.210.114 port 50300
2019-09-30T09:40:21.9256911495-001 sshd\[45110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.167.210.114
2019-09-30T09:40:24.0749101495-001 sshd\[45110\]: Failed password for invalid user cssserver from 69.167.210.114 port 50300 ssh2
2019-09-30T09:46:02.4952111495-001 sshd\[45467\]: Invalid user procalc from 69.167.210.114 port 55110
2019-09-30T09:46:02.5026821495-001 sshd\[45467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.167.210.114
...
2019-09-30 21:57:58

Recently Reported IPs

222.252.216.130 5.144.130.21 91.214.211.187 61.160.95.126
220.176.172.157 107.170.198.109 185.232.67.13 54.38.241.171
60.13.197.131 184.154.47.5 162.243.150.222 185.234.217.215
119.146.145.50 221.224.40.74 185.42.195.83 122.227.20.90
118.163.97.19 129.204.11.182 116.120.58.205 111.230.132.130