Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America

Internet Service Provider: Microsoft Corporation

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspambots
<6 unauthorized SSH connections
2020-07-15 15:17:24
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.149.129.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53457
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.149.129.244.			IN	A

;; AUTHORITY SECTION:
.			531	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020071500 1800 900 604800 86400

;; Query time: 95 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jul 15 15:17:13 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 244.129.149.52.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.129.149.52.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
41.89.160.13 attackspambots
Aug 17 17:04:28 lcdev sshd\[615\]: Invalid user mongo from 41.89.160.13
Aug 17 17:04:28 lcdev sshd\[615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.89.160.13
Aug 17 17:04:30 lcdev sshd\[615\]: Failed password for invalid user mongo from 41.89.160.13 port 54346 ssh2
Aug 17 17:10:08 lcdev sshd\[1320\]: Invalid user web from 41.89.160.13
Aug 17 17:10:08 lcdev sshd\[1320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.89.160.13
2019-08-18 11:12:23
149.56.96.78 attackspam
Aug 17 23:21:27 vps200512 sshd\[13312\]: Invalid user janice from 149.56.96.78
Aug 17 23:21:27 vps200512 sshd\[13312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.96.78
Aug 17 23:21:30 vps200512 sshd\[13312\]: Failed password for invalid user janice from 149.56.96.78 port 4806 ssh2
Aug 17 23:25:22 vps200512 sshd\[13387\]: Invalid user matti from 149.56.96.78
Aug 17 23:25:22 vps200512 sshd\[13387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.96.78
2019-08-18 11:31:53
171.33.251.68 attackspam
171.33.251.68 - - [18/Aug/2019:05:10:07 +0200] "GET /administrator/index.php HTTP/1.1" 302 538
...
2019-08-18 11:10:17
113.28.150.75 attackbotsspam
Aug 18 05:28:17 dedicated sshd[26429]: Invalid user dimas from 113.28.150.75 port 56513
2019-08-18 11:30:37
167.114.192.162 attackspambots
Automatic report - Banned IP Access
2019-08-18 11:23:52
42.119.222.106 attackbotsspam
23/tcp 23/tcp
[2019-08-18]2pkt
2019-08-18 11:28:51
109.230.182.12 attack
[portscan] Port scan
2019-08-18 11:31:06
212.13.103.211 attackbotsspam
Aug 18 04:59:02 mail sshd[26453]: Invalid user co from 212.13.103.211
Aug 18 04:59:02 mail sshd[26453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.13.103.211
Aug 18 04:59:02 mail sshd[26453]: Invalid user co from 212.13.103.211
Aug 18 04:59:05 mail sshd[26453]: Failed password for invalid user co from 212.13.103.211 port 52974 ssh2
Aug 18 05:09:57 mail sshd[3673]: Invalid user ha from 212.13.103.211
...
2019-08-18 11:25:33
139.59.190.69 attackbots
Aug 18 00:31:19 ubuntu-2gb-nbg1-dc3-1 sshd[11057]: Failed password for root from 139.59.190.69 port 34214 ssh2
Aug 18 00:35:24 ubuntu-2gb-nbg1-dc3-1 sshd[11374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.190.69
...
2019-08-18 10:54:53
115.88.201.58 attack
Aug 18 00:50:24 vps01 sshd[1810]: Failed password for root from 115.88.201.58 port 39474 ssh2
Aug 18 00:55:02 vps01 sshd[1843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.88.201.58
2019-08-18 11:01:55
178.32.47.97 attackbotsspam
Aug 18 01:59:58 ns315508 sshd[17841]: Invalid user aok from 178.32.47.97 port 40450
Aug 18 01:59:58 ns315508 sshd[17841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.47.97
Aug 18 01:59:58 ns315508 sshd[17841]: Invalid user aok from 178.32.47.97 port 40450
Aug 18 02:00:00 ns315508 sshd[17841]: Failed password for invalid user aok from 178.32.47.97 port 40450 ssh2
Aug 18 02:05:34 ns315508 sshd[17930]: Invalid user ws from 178.32.47.97 port 60062
...
2019-08-18 10:54:06
182.235.185.187 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-18 11:03:09
62.197.120.198 attackspam
Aug 18 05:10:04 vps647732 sshd[12514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.197.120.198
Aug 18 05:10:06 vps647732 sshd[12514]: Failed password for invalid user shante from 62.197.120.198 port 60172 ssh2
...
2019-08-18 11:14:11
80.211.132.145 attack
Aug 18 05:09:48 nextcloud sshd\[5242\]: Invalid user webroot from 80.211.132.145
Aug 18 05:09:48 nextcloud sshd\[5242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.132.145
Aug 18 05:09:51 nextcloud sshd\[5242\]: Failed password for invalid user webroot from 80.211.132.145 port 49922 ssh2
...
2019-08-18 11:32:11
35.222.34.56 attackspambots
none
2019-08-18 11:23:06

Recently Reported IPs

51.178.40.97 159.224.186.93 104.215.118.138 210.245.54.174
192.99.212.128 54.134.84.133 208.184.219.49 37.167.53.128
139.59.77.43 189.79.149.227 91.231.244.155 14.178.76.155
203.150.168.5 52.255.133.45 18.194.166.6 141.2.130.220
192.236.147.42 137.117.217.32 95.161.189.54 104.43.229.42