Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 6.149.137.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45859
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;6.149.137.159.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 12:34:47 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 159.137.149.6.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 6.149.137.159.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
138.68.226.234 attackspambots
$f2bV_matches
2020-03-29 20:45:39
74.82.47.3 attack
Unauthorized FTP access attempts
2020-03-29 20:54:40
51.38.80.104 attackbots
Mar 29 14:49:03 jane sshd[18380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.80.104 
Mar 29 14:49:06 jane sshd[18380]: Failed password for invalid user chendi from 51.38.80.104 port 56210 ssh2
...
2020-03-29 20:51:58
141.98.80.147 attackbotsspam
Postfix Brute-Force reported by Fail2Ban
2020-03-29 20:41:28
206.189.28.79 attackbots
Mar 29 13:08:51 ks10 sshd[1333858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.28.79 
Mar 29 13:08:53 ks10 sshd[1333858]: Failed password for invalid user test from 206.189.28.79 port 37250 ssh2
...
2020-03-29 20:22:45
106.13.72.190 attack
Mar 29 14:49:03 nextcloud sshd\[6445\]: Invalid user x from 106.13.72.190
Mar 29 14:49:03 nextcloud sshd\[6445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.190
Mar 29 14:49:05 nextcloud sshd\[6445\]: Failed password for invalid user x from 106.13.72.190 port 39848 ssh2
2020-03-29 20:50:27
170.106.38.190 attackbotsspam
(sshd) Failed SSH login from 170.106.38.190 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 29 13:47:06 amsweb01 sshd[9417]: Invalid user auq from 170.106.38.190 port 60266
Mar 29 13:47:09 amsweb01 sshd[9417]: Failed password for invalid user auq from 170.106.38.190 port 60266 ssh2
Mar 29 13:55:58 amsweb01 sshd[10579]: Invalid user jog from 170.106.38.190 port 58076
Mar 29 13:56:00 amsweb01 sshd[10579]: Failed password for invalid user jog from 170.106.38.190 port 58076 ssh2
Mar 29 14:02:31 amsweb01 sshd[11523]: Invalid user snr from 170.106.38.190 port 43750
2020-03-29 20:28:02
112.85.42.188 attackspambots
03/29/2020-08:56:05.195504 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-03-29 20:56:25
62.171.173.13 attackspambots
Hits on port : 554
2020-03-29 20:59:11
23.21.59.179 attackspambots
SSH login attempts.
2020-03-29 20:11:30
54.204.26.223 attack
SSH login attempts.
2020-03-29 20:08:40
94.23.42.196 attackspam
94.23.42.196 - - [29/Mar/2020:12:54:49 +0200] "GET /wp-login.php HTTP/1.1" 200 5688 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
94.23.42.196 - - [29/Mar/2020:12:54:51 +0200] "POST /wp-login.php HTTP/1.1" 200 6587 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
94.23.42.196 - - [29/Mar/2020:12:54:52 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-03-29 20:19:59
129.28.183.62 attackbots
Mar 29 13:45:39 l03 sshd[27101]: Invalid user gc from 129.28.183.62 port 37586
...
2020-03-29 20:46:07
194.186.218.22 attackspam
SSH login attempts.
2020-03-29 20:21:44
185.9.226.28 attack
Total attacks: 2
2020-03-29 20:49:20

Recently Reported IPs

48.100.152.163 67.75.33.187 13.194.68.222 58.44.246.78
128.224.197.143 202.72.179.75 232.136.232.207 92.13.224.219
94.206.129.207 186.229.107.171 33.20.128.83 106.63.133.89
64.46.218.61 254.43.243.185 133.198.143.30 4.118.235.59
142.109.122.182 191.52.122.197 246.117.50.130 156.123.160.135