Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.149.45.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13992
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.149.45.74.			IN	A

;; AUTHORITY SECTION:
.			583	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091902 1800 900 604800 86400

;; Query time: 620 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 20 10:45:13 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 74.45.149.80.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 74.45.149.80.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.180.6 attackspam
Mar 20 21:18:44 NPSTNNYC01T sshd[30748]: Failed password for root from 222.186.180.6 port 34708 ssh2
Mar 20 21:18:57 NPSTNNYC01T sshd[30748]: error: maximum authentication attempts exceeded for root from 222.186.180.6 port 34708 ssh2 [preauth]
Mar 20 21:19:02 NPSTNNYC01T sshd[30755]: Failed password for root from 222.186.180.6 port 50474 ssh2
...
2020-03-21 09:31:22
51.77.226.68 attackspambots
Mar 21 02:28:32 vpn01 sshd[26723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.226.68
Mar 21 02:28:34 vpn01 sshd[26723]: Failed password for invalid user pn from 51.77.226.68 port 48186 ssh2
...
2020-03-21 09:49:17
49.235.144.143 attack
Mar 21 00:15:56 sd-53420 sshd\[13957\]: User plex from 49.235.144.143 not allowed because none of user's groups are listed in AllowGroups
Mar 21 00:15:56 sd-53420 sshd\[13957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.144.143  user=plex
Mar 21 00:15:58 sd-53420 sshd\[13957\]: Failed password for invalid user plex from 49.235.144.143 port 43122 ssh2
Mar 21 00:21:49 sd-53420 sshd\[15854\]: Invalid user paul from 49.235.144.143
Mar 21 00:21:49 sd-53420 sshd\[15854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.144.143
...
2020-03-21 09:50:04
200.73.238.250 attack
Mar 21 01:49:41 icinga sshd[15059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.238.250 
Mar 21 01:49:43 icinga sshd[15059]: Failed password for invalid user nina from 200.73.238.250 port 39698 ssh2
Mar 21 01:50:33 icinga sshd[16712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.238.250 
...
2020-03-21 09:39:36
113.254.81.89 attack
Port probing on unauthorized port 5555
2020-03-21 09:42:13
111.21.99.227 attackbots
SSH-BruteForce
2020-03-21 09:46:52
62.28.34.125 attack
Mar 21 02:10:27 sd-53420 sshd\[19236\]: Invalid user jayme from 62.28.34.125
Mar 21 02:10:27 sd-53420 sshd\[19236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.28.34.125
Mar 21 02:10:29 sd-53420 sshd\[19236\]: Failed password for invalid user jayme from 62.28.34.125 port 11119 ssh2
Mar 21 02:15:30 sd-53420 sshd\[20964\]: Invalid user roksanna from 62.28.34.125
Mar 21 02:15:30 sd-53420 sshd\[20964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.28.34.125
...
2020-03-21 09:20:20
58.59.7.151 attackbots
Mar 20 23:39:31 game-panel sshd[13760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.59.7.151
Mar 20 23:39:33 game-panel sshd[13760]: Failed password for invalid user laurentiu from 58.59.7.151 port 22039 ssh2
Mar 20 23:43:43 game-panel sshd[13978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.59.7.151
2020-03-21 09:17:10
206.189.112.173 attack
SSH bruteforce (Triggered fail2ban)
2020-03-21 09:16:43
140.143.249.246 attack
Invalid user 22 from 140.143.249.246 port 33716
2020-03-21 09:51:31
106.13.87.145 attackbotsspam
Invalid user cms from 106.13.87.145 port 33598
2020-03-21 09:23:17
5.101.51.45 attackspambots
Mar 20 21:13:36 reverseproxy sshd[12155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.101.51.45
Mar 20 21:13:38 reverseproxy sshd[12155]: Failed password for invalid user sam from 5.101.51.45 port 59832 ssh2
2020-03-21 09:36:02
46.223.115.60 attackbotsspam
Triggered: repeated knocking on closed ports.
2020-03-21 09:17:56
54.37.71.144 attack
Mar 21 02:19:41 meumeu sshd[29163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.71.144 
Mar 21 02:19:43 meumeu sshd[29163]: Failed password for invalid user fj from 54.37.71.144 port 44934 ssh2
Mar 21 02:23:53 meumeu sshd[29974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.71.144 
...
2020-03-21 09:35:33
82.125.211.136 attackspambots
detected by Fail2Ban
2020-03-21 09:17:29

Recently Reported IPs

103.75.44.226 148.55.201.63 204.74.43.153 74.167.5.123
168.11.240.84 199.94.13.38 157.245.195.161 39.4.240.132
183.159.214.73 43.63.161.145 41.165.64.170 91.224.179.113
100.66.5.35 113.52.158.178 159.203.193.240 221.245.187.138
151.70.56.177 169.201.102.40 38.141.44.66 219.113.137.25