Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.42.3.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53786
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;61.42.3.149.			IN	A

;; AUTHORITY SECTION:
.			544	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020012900 1800 900 604800 86400

;; Query time: 118 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 21:10:21 CST 2020
;; MSG SIZE  rcvd: 115
Host info
Host 149.3.42.61.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.3.42.61.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.29.112.209 attackspam
May 11 05:54:59 mail sshd[2979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.29.112.209 
May 11 05:55:00 mail sshd[2979]: Failed password for invalid user admin from 190.29.112.209 port 47059 ssh2
...
2020-05-11 13:40:49
190.187.112.3 attackbots
srv02 SSH BruteForce Attacks 22 ..
2020-05-11 13:33:53
187.225.181.150 attackbotsspam
May 11 06:43:52 vps sshd[278326]: Failed password for invalid user vps from 187.225.181.150 port 40632 ssh2
May 11 06:46:15 vps sshd[292267]: Invalid user galaxy from 187.225.181.150 port 15777
May 11 06:46:15 vps sshd[292267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.225.181.150
May 11 06:46:18 vps sshd[292267]: Failed password for invalid user galaxy from 187.225.181.150 port 15777 ssh2
May 11 06:53:32 vps sshd[323407]: Invalid user noah from 187.225.181.150 port 5159
...
2020-05-11 13:28:20
144.217.83.201 attack
*Port Scan* detected from 144.217.83.201 (CA/Canada/Quebec/Montreal (Ville-Marie)/201.ip-144-217-83.net). 4 hits in the last 10 seconds
2020-05-11 13:32:39
187.182.168.14 attackbotsspam
Unauthorized connection attempt detected from IP address 187.182.168.14 to port 8000
2020-05-11 13:22:31
80.82.78.104 attackbots
[portscan] tcp/23 [TELNET]
[portscan] tcp/81 [alter-web/web-proxy]
[scan/connect: 2 time(s)]
*(RWIN=65535)(05110729)
2020-05-11 13:20:31
157.245.208.74 attackbotsspam
firewall-block, port(s): 17401/tcp
2020-05-11 13:31:16
162.243.165.140 attack
May 11 07:56:19 ift sshd\[3520\]: Invalid user hldm from 162.243.165.140May 11 07:56:21 ift sshd\[3520\]: Failed password for invalid user hldm from 162.243.165.140 port 37684 ssh2May 11 08:00:56 ift sshd\[4595\]: Invalid user team from 162.243.165.140May 11 08:00:59 ift sshd\[4595\]: Failed password for invalid user team from 162.243.165.140 port 46062 ssh2May 11 08:05:32 ift sshd\[5502\]: Invalid user meeting from 162.243.165.140
...
2020-05-11 13:41:04
121.203.202.122 attack
May 11 05:55:06 mail sshd[3030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.203.202.122 
May 11 05:55:08 mail sshd[3030]: Failed password for invalid user admin from 121.203.202.122 port 54541 ssh2
...
2020-05-11 13:29:20
191.255.47.54 attackbots
Port probing on unauthorized port 8080
2020-05-11 13:33:26
82.209.209.202 attack
May 11 05:52:32 srv01 sshd[9061]: Invalid user lzj from 82.209.209.202 port 46198
May 11 05:52:32 srv01 sshd[9061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.209.209.202
May 11 05:52:32 srv01 sshd[9061]: Invalid user lzj from 82.209.209.202 port 46198
May 11 05:52:34 srv01 sshd[9061]: Failed password for invalid user lzj from 82.209.209.202 port 46198 ssh2
May 11 05:55:24 srv01 sshd[9172]: Invalid user aquser from 82.209.209.202 port 35136
...
2020-05-11 13:13:14
114.67.104.59 attackbotsspam
May 11 12:28:25 webhost01 sshd[20251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.104.59
May 11 12:28:27 webhost01 sshd[20251]: Failed password for invalid user tssrv from 114.67.104.59 port 50884 ssh2
...
2020-05-11 13:35:09
83.212.115.221 attack
SSH invalid-user multiple login attempts
2020-05-11 13:41:59
45.142.195.6 attackbotsspam
May 11 07:39:08 srv01 postfix/smtpd\[21936\]: warning: unknown\[45.142.195.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 11 07:39:09 srv01 postfix/smtpd\[18616\]: warning: unknown\[45.142.195.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 11 07:39:20 srv01 postfix/smtpd\[22278\]: warning: unknown\[45.142.195.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 11 07:39:26 srv01 postfix/smtpd\[21936\]: warning: unknown\[45.142.195.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 11 07:39:49 srv01 postfix/smtpd\[18616\]: warning: unknown\[45.142.195.6\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-05-11 13:44:06
117.102.108.50 attack
(sshd) Failed SSH login from 117.102.108.50 (ID/Indonesia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 11 05:55:02 amsweb01 sshd[3350]: Did not receive identification string from 117.102.108.50 port 59118
May 11 05:55:02 amsweb01 sshd[3349]: Did not receive identification string from 117.102.108.50 port 59117
May 11 05:55:15 amsweb01 sshd[3353]: Invalid user user from 117.102.108.50 port 59347
May 11 05:55:15 amsweb01 sshd[3355]: Invalid user user from 117.102.108.50 port 59346
May 11 05:55:18 amsweb01 sshd[3355]: Failed password for invalid user user from 117.102.108.50 port 59346 ssh2
2020-05-11 13:15:35

Recently Reported IPs

19.123.17.4 49.83.164.88 49.77.42.145 36.34.12.137
195.171.97.232 1.180.165.38 1.52.177.144 57.127.152.189
222.220.152.222 221.229.24.120 183.166.7.35 183.165.11.185
183.56.50.121 183.52.143.203 182.108.168.9 168.76.111.68
92.104.39.41 207.175.199.237 38.25.34.212 123.137.218.35