Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.20.63.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35493
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;8.20.63.149.			IN	A

;; AUTHORITY SECTION:
.			364	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023032900 1800 900 604800 86400

;; Query time: 81 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 29 18:35:31 CST 2023
;; MSG SIZE  rcvd: 104
Host info
Host 149.63.20.8.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.63.20.8.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.99.25.95 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-17 04:45:37
185.220.101.34 attack
Automatic report - Banned IP Access
2020-02-17 04:34:19
42.119.225.152 attack
1581860637 - 02/16/2020 14:43:57 Host: 42.119.225.152/42.119.225.152 Port: 445 TCP Blocked
2020-02-17 04:46:28
113.53.135.172 attack
Portscan detected
2020-02-17 05:08:19
221.157.214.239 attackspambots
Feb 16 07:13:34 auw2 sshd\[18447\]: Invalid user linux123456 from 221.157.214.239
Feb 16 07:13:34 auw2 sshd\[18447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.157.214.239
Feb 16 07:13:36 auw2 sshd\[18447\]: Failed password for invalid user linux123456 from 221.157.214.239 port 47520 ssh2
Feb 16 07:22:52 auw2 sshd\[19295\]: Invalid user soraya from 221.157.214.239
Feb 16 07:22:52 auw2 sshd\[19295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.157.214.239
2020-02-17 05:07:00
167.71.9.180 attack
Feb 16 20:39:31 pi sshd[17481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.9.180 
Feb 16 20:39:34 pi sshd[17481]: Failed password for invalid user robyn from 167.71.9.180 port 56260 ssh2
2020-02-17 04:40:02
185.202.2.203 attackspam
Unauthorized connection attempt detected from IP address 185.202.2.203 to port 3389
2020-02-17 04:54:51
78.99.122.73 attackbots
ENG,WP GET /wp-login.php
2020-02-17 04:38:14
37.156.146.132 attackspam
SMB Server BruteForce Attack
2020-02-17 04:52:04
219.76.200.27 attackbots
Automatic report - SSH Brute-Force Attack
2020-02-17 04:49:53
115.186.188.53 attackspambots
SSH Brute-Force reported by Fail2Ban
2020-02-17 05:09:58
176.109.20.18 attackspambots
" "
2020-02-17 04:35:48
58.122.118.18 attackspambots
Unauthorized connection attempt detected from IP address 58.122.118.18 to port 23
2020-02-17 04:30:04
193.31.24.113 attackbots
02/16/2020-21:50:33.138299 193.31.24.113 Protocol: 6 SURICATA TLS invalid record/traffic
2020-02-17 04:53:15
37.187.1.235 attackbotsspam
Feb 16 16:31:15 markkoudstaal sshd[24576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.1.235
Feb 16 16:31:17 markkoudstaal sshd[24576]: Failed password for invalid user roborg from 37.187.1.235 port 49824 ssh2
Feb 16 16:33:34 markkoudstaal sshd[24960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.1.235
2020-02-17 04:36:56

Recently Reported IPs

255.168.30.238 215.85.11.31 207.104.191.206 150.133.161.96
138.56.44.106 55.131.121.107 29.250.95.171 201.9.141.209
162.141.148.170 41.133.194.171 228.204.59.79 131.38.135.39
27.172.146.136 40.42.16.214 5.231.168.83 143.53.153.37
9.157.136.133 83.199.95.8 173.98.147.169 57.123.191.253