Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Wetzlar

Region: Hessen

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.81.4.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53710
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;46.81.4.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025071003 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 11 11:38:24 CST 2025
;; MSG SIZE  rcvd: 104
Host info
149.4.81.46.in-addr.arpa domain name pointer p2e510495.dip0.t-ipconnect.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.4.81.46.in-addr.arpa	name = p2e510495.dip0.t-ipconnect.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
200.152.107.169 attackbots
(smtpauth) Failed SMTP AUTH login from 200.152.107.169 (BR/Brazil/mlsrj200152107p179.static.mls.com.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-10 17:54:25 plain authenticator failed for mlsrj200152107p179.static.mls.com.br [200.152.107.169]: 535 Incorrect authentication data (set_id=info)
2020-07-11 00:54:43
167.71.146.220 attackspambots
Jul 10 17:31:24 rocket sshd[5430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.146.220
Jul 10 17:31:26 rocket sshd[5430]: Failed password for invalid user agafi from 167.71.146.220 port 52472 ssh2
...
2020-07-11 00:34:27
182.61.161.121 attack
5x Failed Password
2020-07-11 00:24:28
124.239.148.63 attack
Invalid user countess from 124.239.148.63 port 21568
2020-07-11 00:50:45
119.96.120.113 attack
2020-07-10T19:23:38.222742lavrinenko.info sshd[7507]: Invalid user lynx from 119.96.120.113 port 33840
2020-07-10T19:23:38.229323lavrinenko.info sshd[7507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.96.120.113
2020-07-10T19:23:38.222742lavrinenko.info sshd[7507]: Invalid user lynx from 119.96.120.113 port 33840
2020-07-10T19:23:40.119123lavrinenko.info sshd[7507]: Failed password for invalid user lynx from 119.96.120.113 port 33840 ssh2
2020-07-10T19:27:25.098633lavrinenko.info sshd[7785]: Invalid user fangce from 119.96.120.113 port 44658
...
2020-07-11 00:42:55
190.215.112.122 attackbotsspam
2020-07-10T16:27:52.175738shield sshd\[15209\]: Invalid user testing from 190.215.112.122 port 58807
2020-07-10T16:27:52.187797shield sshd\[15209\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.215.112.122
2020-07-10T16:27:53.947735shield sshd\[15209\]: Failed password for invalid user testing from 190.215.112.122 port 58807 ssh2
2020-07-10T16:30:32.830884shield sshd\[15428\]: Invalid user arias from 190.215.112.122 port 48810
2020-07-10T16:30:32.843625shield sshd\[15428\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.215.112.122
2020-07-11 00:36:33
218.92.0.212 attack
Jul 10 18:18:13 ovpn sshd\[7701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
Jul 10 18:18:16 ovpn sshd\[7701\]: Failed password for root from 218.92.0.212 port 61112 ssh2
Jul 10 18:18:19 ovpn sshd\[7701\]: Failed password for root from 218.92.0.212 port 61112 ssh2
Jul 10 18:18:22 ovpn sshd\[7701\]: Failed password for root from 218.92.0.212 port 61112 ssh2
Jul 10 18:18:36 ovpn sshd\[7800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
2020-07-11 00:28:57
177.92.4.106 attackbotsspam
Jul 10 15:51:36 PorscheCustomer sshd[16570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.92.4.106
Jul 10 15:51:38 PorscheCustomer sshd[16570]: Failed password for invalid user physics from 177.92.4.106 port 51116 ssh2
Jul 10 15:53:29 PorscheCustomer sshd[16612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.92.4.106
...
2020-07-11 00:22:49
124.152.118.131 attackspambots
Jul 10 12:36:55 firewall sshd[11606]: Invalid user renjiawei from 124.152.118.131
Jul 10 12:36:56 firewall sshd[11606]: Failed password for invalid user renjiawei from 124.152.118.131 port 2815 ssh2
Jul 10 12:40:03 firewall sshd[11650]: Invalid user minecraft from 124.152.118.131
...
2020-07-11 00:30:43
141.98.9.161 attack
Jul 10 15:57:53 *** sshd[26755]: Invalid user admin from 141.98.9.161
2020-07-11 00:27:40
104.248.144.94 attackbots
sshd jail - ssh hack attempt
2020-07-11 00:48:47
87.117.2.7 attackspambots
Unauthorized connection attempt from IP address 87.117.2.7 on Port 445(SMB)
2020-07-11 00:58:29
146.115.69.188 attackbotsspam
Hit honeypot r.
2020-07-11 00:57:53
103.223.8.118 attackbotsspam
Unauthorized connection attempt from IP address 103.223.8.118 on Port 445(SMB)
2020-07-11 00:46:52
104.248.159.69 attackbotsspam
$f2bV_matches
2020-07-11 00:29:24

Recently Reported IPs

205.114.130.236 183.68.86.235 1.192.138.96 59.225.99.99
75.185.162.238 136.88.248.84 104.210.95.100 67.147.151.133
129.224.200.187 99.189.134.251 150.130.18.74 34.226.42.228
98.82.36.235 54.166.169.6 13.218.209.245 100.27.17.35
68.69.186.242 220.186.210.3 202.99.224.8 10.24.63.114