Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
81.149.40.112 attack
Unauthorized connection attempt from IP address 81.149.40.112 on Port 445(SMB)
2019-11-29 08:36:45
81.149.40.112 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-27 03:25:15,318 INFO [amun_request_handler] PortScan Detected on Port: 445 (81.149.40.112)
2019-06-27 15:27:16
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.149.4.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17745
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.149.4.42.			IN	A

;; AUTHORITY SECTION:
.			252	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062400 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 24 22:24:22 CST 2022
;; MSG SIZE  rcvd: 104
Host info
42.4.149.81.in-addr.arpa domain name pointer host81-149-4-42.in-addr.btopenworld.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.4.149.81.in-addr.arpa	name = host81-149-4-42.in-addr.btopenworld.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.76.216.218 attack
Unauthorized connection attempt from IP address 41.76.216.218 on Port 445(SMB)
2020-05-24 04:22:06
103.129.223.98 attack
2020-05-23T15:13:40.226109server.mjenks.net sshd[1226324]: Invalid user laq from 103.129.223.98 port 36460
2020-05-23T15:13:40.230550server.mjenks.net sshd[1226324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.223.98
2020-05-23T15:13:40.226109server.mjenks.net sshd[1226324]: Invalid user laq from 103.129.223.98 port 36460
2020-05-23T15:13:41.899583server.mjenks.net sshd[1226324]: Failed password for invalid user laq from 103.129.223.98 port 36460 ssh2
2020-05-23T15:15:49.397925server.mjenks.net sshd[1226567]: Invalid user uki from 103.129.223.98 port 44338
...
2020-05-24 04:31:15
218.78.48.37 attackbotsspam
$f2bV_matches
2020-05-24 04:08:31
220.135.162.48 attackbots
Port probing on unauthorized port 2323
2020-05-24 04:20:11
212.237.1.50 attackbotsspam
May 23 22:15:52 haigwepa sshd[4552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.1.50 
May 23 22:15:54 haigwepa sshd[4552]: Failed password for invalid user gtj from 212.237.1.50 port 46234 ssh2
...
2020-05-24 04:24:07
157.230.245.91 attackspambots
Invalid user dnm from 157.230.245.91 port 57194
2020-05-24 04:16:27
179.127.121.173 attackspambots
Invalid user guest from 179.127.121.173 port 55192
2020-05-24 04:13:35
183.109.124.137 attack
May 23 20:48:46 cdc sshd[14792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.109.124.137 
May 23 20:48:48 cdc sshd[14792]: Failed password for invalid user xyj from 183.109.124.137 port 37920 ssh2
2020-05-24 04:11:42
148.70.58.152 attack
May 23 14:01:58 server1 sshd\[21543\]: Invalid user iva from 148.70.58.152
May 23 14:01:58 server1 sshd\[21543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.58.152 
May 23 14:02:00 server1 sshd\[21543\]: Failed password for invalid user iva from 148.70.58.152 port 36626 ssh2
May 23 14:03:16 server1 sshd\[21882\]: Invalid user gxl from 148.70.58.152
May 23 14:03:16 server1 sshd\[21882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.58.152 
...
2020-05-24 04:17:13
49.231.251.172 attack
Unauthorized connection attempt from IP address 49.231.251.172 on Port 445(SMB)
2020-05-24 04:35:55
138.197.210.82 attackspambots
2020-05-23T16:15:37.042704mail.thespaminator.com sshd[4198]: Invalid user eqn from 138.197.210.82 port 58276
2020-05-23T16:15:39.459503mail.thespaminator.com sshd[4198]: Failed password for invalid user eqn from 138.197.210.82 port 58276 ssh2
...
2020-05-24 04:39:58
64.225.67.229 attack
[MK-VM5] Blocked by UFW
2020-05-24 04:36:57
189.207.244.53 attack
Unauthorized connection attempt from IP address 189.207.244.53 on Port 445(SMB)
2020-05-24 04:26:42
175.6.102.248 attack
Invalid user yxr from 175.6.102.248 port 49802
2020-05-24 04:15:10
219.153.31.186 attackspambots
May 23 14:31:20 *** sshd[3181]: Invalid user ewo from 219.153.31.186
2020-05-24 04:07:30

Recently Reported IPs

137.226.235.142 5.167.70.101 5.167.70.104 169.229.91.24
169.229.93.115 169.229.92.155 169.229.91.122 137.226.143.248
137.226.236.55 169.229.91.26 169.229.91.95 169.229.91.146
5.167.70.140 223.171.91.150 169.229.91.78 137.226.9.79
137.226.66.87 125.107.139.101 83.212.93.12 5.167.66.179