Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 67.98.245.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1277
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;67.98.245.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:00:51 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 149.245.98.67.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 149.245.98.67.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
196.192.110.100 attackspambots
$f2bV_matches
2019-12-23 05:49:58
106.13.186.127 attackbotsspam
Dec 22 20:44:51 localhost sshd\[29423\]: Invalid user cochenet from 106.13.186.127 port 55380
Dec 22 20:44:51 localhost sshd\[29423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.186.127
Dec 22 20:44:53 localhost sshd\[29423\]: Failed password for invalid user cochenet from 106.13.186.127 port 55380 ssh2
2019-12-23 05:43:47
36.70.8.60 attackbotsspam
Unauthorized connection attempt from IP address 36.70.8.60 on Port 445(SMB)
2019-12-23 06:16:25
198.27.67.154 attackbots
2019-12-22T21:43:36.714833shield sshd\[15049\]: Invalid user altibase from 198.27.67.154 port 56120
2019-12-22T21:43:36.719352shield sshd\[15049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns500031.ip-198-27-67.net
2019-12-22T21:43:38.579510shield sshd\[15049\]: Failed password for invalid user altibase from 198.27.67.154 port 56120 ssh2
2019-12-22T21:44:03.231738shield sshd\[15257\]: Invalid user altibase from 198.27.67.154 port 45078
2019-12-22T21:44:03.235984shield sshd\[15257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns500031.ip-198-27-67.net
2019-12-23 05:53:12
201.248.139.100 attack
1577025911 - 12/22/2019 15:45:11 Host: 201.248.139.100/201.248.139.100 Port: 445 TCP Blocked
2019-12-23 06:06:40
219.80.251.159 attackspambots
Unauthorized connection attempt from IP address 219.80.251.159 on Port 445(SMB)
2019-12-23 05:58:26
112.85.42.237 attack
--- report ---
Dec 22 18:59:54 sshd: Connection from 112.85.42.237 port 45243
2019-12-23 06:12:40
79.111.121.107 attackbots
Unauthorized connection attempt from IP address 79.111.121.107 on Port 445(SMB)
2019-12-23 06:13:41
185.228.100.170 attackbotsspam
1577025915 - 12/22/2019 15:45:15 Host: 185.228.100.170/185.228.100.170 Port: 445 TCP Blocked
2019-12-23 06:00:57
157.230.129.73 attack
Dec 10 23:53:13 microserver sshd[22874]: Invalid user bryington from 157.230.129.73 port 51738
Dec 10 23:53:13 microserver sshd[22874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.129.73
Dec 10 23:53:15 microserver sshd[22874]: Failed password for invalid user bryington from 157.230.129.73 port 51738 ssh2
Dec 11 00:00:14 microserver sshd[24120]: Invalid user bottazzi from 157.230.129.73 port 32797
Dec 11 00:00:14 microserver sshd[24120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.129.73
Dec 11 00:13:43 microserver sshd[27267]: Invalid user naegeli from 157.230.129.73 port 51403
Dec 11 00:13:43 microserver sshd[27267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.129.73
Dec 11 00:13:45 microserver sshd[27267]: Failed password for invalid user naegeli from 157.230.129.73 port 51403 ssh2
Dec 11 00:20:40 microserver sshd[28625]: Invalid user 333333333 from 157
2019-12-23 05:46:39
104.225.223.199 attack
Attempted to connect 2 times to port 53 UDP
2019-12-23 05:47:48
95.68.35.160 attack
Unauthorized connection attempt from IP address 95.68.35.160 on Port 445(SMB)
2019-12-23 06:14:48
189.203.131.116 attackbotsspam
Unauthorized connection attempt from IP address 189.203.131.116 on Port 445(SMB)
2019-12-23 05:49:21
190.117.62.241 attack
Dec 22 21:43:44 MainVPS sshd[15883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.117.62.241  user=root
Dec 22 21:43:46 MainVPS sshd[15883]: Failed password for root from 190.117.62.241 port 60250 ssh2
Dec 22 21:49:51 MainVPS sshd[27746]: Invalid user quoc from 190.117.62.241 port 38466
Dec 22 21:49:51 MainVPS sshd[27746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.117.62.241
Dec 22 21:49:51 MainVPS sshd[27746]: Invalid user quoc from 190.117.62.241 port 38466
Dec 22 21:49:53 MainVPS sshd[27746]: Failed password for invalid user quoc from 190.117.62.241 port 38466 ssh2
...
2019-12-23 05:36:41
49.81.106.146 attack
Automatic report - Port Scan Attack
2019-12-23 05:44:26

Recently Reported IPs

141.249.55.192 48.36.141.127 125.51.118.29 57.115.176.147
221.170.95.129 147.22.237.227 84.235.167.181 97.246.8.222
89.191.130.130 45.94.95.125 169.9.154.225 40.133.239.2
14.151.187.162 206.14.62.142 125.210.146.107 129.41.150.46
193.96.92.230 114.29.83.47 88.176.117.196 190.35.129.191