Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 67.158.255.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18325
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;67.158.255.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 10:15:34 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 149.255.158.67.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 67.158.255.149.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
201.140.212.85 attackspam
Unauthorized connection attempt detected from IP address 201.140.212.85 to port 80
2020-04-13 00:15:54
218.69.16.26 attackspam
2020-04-11T10:19:02.0109581495-001 sshd[61201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.69.16.26  user=root
2020-04-11T10:19:04.4040921495-001 sshd[61201]: Failed password for root from 218.69.16.26 port 52961 ssh2
2020-04-11T10:23:23.6631011495-001 sshd[61408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.69.16.26  user=root
2020-04-11T10:23:25.0225471495-001 sshd[61408]: Failed password for root from 218.69.16.26 port 45959 ssh2
2020-04-11T10:27:43.6909321495-001 sshd[61571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.69.16.26  user=root
2020-04-11T10:27:46.0762491495-001 sshd[61571]: Failed password for root from 218.69.16.26 port 38963 ssh2
...
2020-04-13 00:12:56
1.52.37.118 attackbotsspam
Unauthorized connection attempt detected from IP address 1.52.37.118 to port 445
2020-04-13 00:12:27
185.72.25.42 attackspambots
Unauthorized connection attempt detected from IP address 185.72.25.42 to port 23
2020-04-12 23:44:02
52.173.19.252 attackspam
Unauthorized connection attempt detected from IP address 52.173.19.252 to port 8089
2020-04-13 00:05:48
125.138.64.28 attackbotsspam
Unauthorized connection attempt detected from IP address 125.138.64.28 to port 81
2020-04-12 23:49:00
188.159.250.195 attackbotsspam
Unauthorized connection attempt detected from IP address 188.159.250.195 to port 8080
2020-04-12 23:41:56
190.198.2.209 attackbotsspam
Unauthorized connection attempt detected from IP address 190.198.2.209 to port 445
2020-04-13 00:18:32
37.54.103.228 attackbots
Unauthorized connection attempt detected from IP address 37.54.103.228 to port 23
2020-04-13 00:09:16
183.97.139.14 attackspambots
Unauthorized connection attempt detected from IP address 183.97.139.14 to port 81
2020-04-12 23:45:11
91.140.22.195 attackbots
Honeypot attack, port: 81, PTR: adsl-195.91.140.22.tellas.gr.
2020-04-12 23:53:10
80.3.89.178 attackbotsspam
Unauthorized connection attempt detected from IP address 80.3.89.178 to port 80
2020-04-12 23:59:58
190.1.127.168 attackbotsspam
Unauthorized connection attempt detected from IP address 190.1.127.168 to port 8089
2020-04-13 00:20:32
170.178.178.2 attackbots
Unauthorized connection attempt detected from IP address 170.178.178.2 to port 445
2020-04-12 23:47:02
190.201.82.58 attackbots
Unauthorized connection attempt detected from IP address 190.201.82.58 to port 445
2020-04-12 23:36:38

Recently Reported IPs

125.210.240.125 98.136.201.17 24.213.139.159 150.43.102.164
46.160.161.227 67.58.202.13 189.187.232.37 161.60.65.95
203.185.163.46 161.208.12.253 143.72.244.11 207.98.15.195
191.83.233.130 87.181.41.53 124.2.139.159 136.121.245.88
106.4.135.124 41.245.166.204 9.213.33.24 223.19.65.54