Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.4.242.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41222
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;46.4.242.149.			IN	A

;; AUTHORITY SECTION:
.			532	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023011200 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 12 16:18:46 CST 2023
;; MSG SIZE  rcvd: 105
Host info
149.242.4.46.in-addr.arpa domain name pointer static.149.242.4.46.clients.your-server.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.242.4.46.in-addr.arpa	name = static.149.242.4.46.clients.your-server.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.102.141.61 attack
DATE:2020-06-19 05:52:22, IP:103.102.141.61, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq)
2020-06-19 20:12:38
212.244.23.144 attackspambots
(PL/Poland/-) SMTP Bruteforcing attempts
2020-06-19 20:14:03
116.101.54.6 attackspam
xmlrpc attack
2020-06-19 20:27:17
128.199.200.155 attack
SSH login attempts.
2020-06-19 19:56:13
111.229.70.97 attackbotsspam
2020-06-19T09:36:27+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-06-19 20:00:43
59.125.182.209 attackspam
Invalid user user14 from 59.125.182.209 port 48731
2020-06-19 20:01:28
180.76.190.221 attackbotsspam
Invalid user oracle from 180.76.190.221 port 33036
2020-06-19 20:00:01
47.94.1.121 attackbotsspam
Jun 19 08:18:06 Host-KEWR-E sshd[18903]: Invalid user iris from 47.94.1.121 port 42340
...
2020-06-19 20:30:33
212.244.23.96 attackbots
(PL/Poland/-) SMTP Bruteforcing attempts
2020-06-19 20:05:25
45.95.168.145 attack
2020-06-19T07:17:58.729886morrigan.ad5gb.com sshd[1439617]: Disconnected from authenticating user root 45.95.168.145 port 35274 [preauth]
2020-06-19T07:18:06.740848morrigan.ad5gb.com sshd[1439724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.95.168.145  user=root
2020-06-19T07:18:08.664423morrigan.ad5gb.com sshd[1439724]: Failed password for root from 45.95.168.145 port 42740 ssh2
2020-06-19 20:28:00
59.145.221.103 attackspambots
Invalid user liam from 59.145.221.103 port 49806
2020-06-19 20:09:46
103.113.90.141 attackspam
2020-06-19 07:15:03.345760-0500  localhost smtpd[92184]: NOQUEUE: reject: RCPT from unknown[103.113.90.141]: 554 5.7.1 Service unavailable; Client host [103.113.90.141] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=<012b1a16.billelectic.xyz>
2020-06-19 20:27:34
142.93.101.148 attack
...
2020-06-19 20:33:05
220.161.81.131 attack
Jun 19 14:14:46 eventyay sshd[14070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.161.81.131
Jun 19 14:14:49 eventyay sshd[14070]: Failed password for invalid user venkat from 220.161.81.131 port 58788 ssh2
Jun 19 14:18:02 eventyay sshd[14199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.161.81.131
...
2020-06-19 20:32:30
212.244.23.122 attackspambots
(PL/Poland/-) SMTP Bruteforcing attempts
2020-06-19 20:18:42

Recently Reported IPs

179.43.187.43 51.79.133.20 199.195.252.196 103.150.18.218
163.116.177.31 83.53.249.164 36.37.210.197 23.229.80.7
131.161.68.38 162.251.5.152 208.109.15.199 146.190.127.104
198.98.59.118 43.153.81.99 135.12.207.17 1.22.115.168
47.243.55.21 163.116.177.39 80.169.156.52 195.8.249.242