Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 65.134.9.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37117
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;65.134.9.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 14:09:23 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 149.9.134.65.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.9.134.65.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
93.178.216.108 attack
Mail sent to address hacked/leaked from Last.fm
2019-07-02 17:20:58
168.228.149.176 attackspam
SMTP-sasl brute force
...
2019-07-02 17:22:58
54.38.15.252 attack
Jul  2 06:04:50 marvibiene sshd[14055]: Invalid user user from 54.38.15.252 port 33012
Jul  2 06:04:50 marvibiene sshd[14055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.15.252
Jul  2 06:04:50 marvibiene sshd[14055]: Invalid user user from 54.38.15.252 port 33012
Jul  2 06:04:52 marvibiene sshd[14055]: Failed password for invalid user user from 54.38.15.252 port 33012 ssh2
...
2019-07-02 17:55:32
23.101.133.58 attackspam
Jul  2 06:52:18 localhost sshd\[18736\]: Invalid user app from 23.101.133.58 port 52194
Jul  2 06:52:18 localhost sshd\[18736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.101.133.58
...
2019-07-02 17:27:56
118.24.176.22 attackspam
Dec 22 20:33:09 motanud sshd\[15821\]: Invalid user nagios from 118.24.176.22 port 45800
Dec 22 20:33:09 motanud sshd\[15821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.176.22
Dec 22 20:33:11 motanud sshd\[15821\]: Failed password for invalid user nagios from 118.24.176.22 port 45800 ssh2
2019-07-02 18:19:34
103.97.82.50 attackspambots
19/7/1@23:47:13: FAIL: Alarm-Intrusion address from=103.97.82.50
...
2019-07-02 18:19:52
175.138.54.68 attackbots
Jul  2 11:36:46 icinga sshd[25489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.138.54.68
Jul  2 11:36:48 icinga sshd[25489]: Failed password for invalid user squ1sh from 175.138.54.68 port 51202 ssh2
...
2019-07-02 17:47:32
205.185.115.123 attack
Jul  2 08:31:38 mail sshd\[9727\]: Failed password for invalid user redmine from 205.185.115.123 port 46872 ssh2
Jul  2 08:50:11 mail sshd\[9942\]: Invalid user ftp from 205.185.115.123 port 42278
Jul  2 08:50:11 mail sshd\[9942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.115.123
...
2019-07-02 17:28:46
191.240.84.13 attackbots
failed_logins
2019-07-02 17:48:41
177.130.160.195 attackspambots
$f2bV_matches
2019-07-02 17:58:39
118.24.173.104 attack
Jan 16 22:28:19 motanud sshd\[9551\]: Invalid user we from 118.24.173.104 port 33179
Jan 16 22:28:19 motanud sshd\[9551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.173.104
Jan 16 22:28:21 motanud sshd\[9551\]: Failed password for invalid user we from 118.24.173.104 port 33179 ssh2
Mar  1 08:05:30 motanud sshd\[30734\]: Invalid user yr from 118.24.173.104 port 39899
Mar  1 08:05:30 motanud sshd\[30734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.173.104
Mar  1 08:05:32 motanud sshd\[30734\]: Failed password for invalid user yr from 118.24.173.104 port 39899 ssh2
Mar  1 08:15:51 motanud sshd\[31383\]: Invalid user rr from 118.24.173.104 port 60047
Mar  1 08:15:51 motanud sshd\[31383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.173.104
Mar  1 08:15:53 motanud sshd\[31383\]: Failed password for invalid user rr from 118.24.173.104 port 60047 ssh2
2019-07-02 18:21:36
119.4.225.52 attackbotsspam
Jul  2 08:48:14 ArkNodeAT sshd\[15460\]: Invalid user wordpress from 119.4.225.52
Jul  2 08:48:14 ArkNodeAT sshd\[15460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.4.225.52
Jul  2 08:48:16 ArkNodeAT sshd\[15460\]: Failed password for invalid user wordpress from 119.4.225.52 port 36999 ssh2
2019-07-02 17:37:54
43.239.78.4 attackspambots
TCP port 445 (SMB) attempt blocked by firewall. [2019-07-02 05:47:02]
2019-07-02 17:50:16
41.38.196.63 attack
23/tcp
[2019-07-02]1pkt
2019-07-02 18:05:42
2.139.176.35 attackbots
Jul  2 10:38:15 cvbmail sshd\[15878\]: Invalid user lydie from 2.139.176.35
Jul  2 10:38:15 cvbmail sshd\[15878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.176.35
Jul  2 10:38:17 cvbmail sshd\[15878\]: Failed password for invalid user lydie from 2.139.176.35 port 14236 ssh2
2019-07-02 18:04:02

Recently Reported IPs

64.69.83.211 169.209.219.32 246.243.241.211 132.143.137.162
93.112.234.121 165.81.187.13 203.217.151.152 226.202.161.163
233.48.247.174 120.87.52.8 241.111.49.132 186.204.157.98
123.174.2.232 22.150.226.136 97.74.12.110 57.245.206.197
46.115.0.79 227.184.99.153 32.63.163.93 245.232.103.155