Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.242.40.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38324
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;83.242.40.149.			IN	A

;; AUTHORITY SECTION:
.			331	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022103100 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 31 23:29:55 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 149.40.242.83.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.40.242.83.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
110.78.168.150 attackbots
445/tcp
[2019-07-03]1pkt
2019-07-03 17:24:45
190.136.97.12 attackspam
445/tcp 445/tcp 445/tcp
[2019-07-03]3pkt
2019-07-03 17:33:18
45.115.6.161 attackspambots
8080/tcp
[2019-07-03]1pkt
2019-07-03 16:56:08
138.68.17.62 attackbots
(mod_security) mod_security (id:240335) triggered by 138.68.17.62 (US/United States/-): 5 in the last 3600 secs
2019-07-03 17:37:00
177.205.254.68 attack
SMB Server BruteForce Attack
2019-07-03 17:05:30
187.113.198.21 attack
ssh failed login
2019-07-03 16:52:56
185.234.218.128 attackbotsspam
Rude login attack (57 tries in 1d)
2019-07-03 17:27:34
59.127.172.234 attackspam
Jul  3 10:47:24 vps647732 sshd[6941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.172.234
Jul  3 10:47:26 vps647732 sshd[6941]: Failed password for invalid user hiver from 59.127.172.234 port 33748 ssh2
...
2019-07-03 17:04:22
218.92.0.211 attackspam
Jul  3 06:31:32 vps647732 sshd[3789]: Failed password for root from 218.92.0.211 port 30306 ssh2
...
2019-07-03 17:11:00
14.161.24.1 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 04:48:04,221 INFO [amun_request_handler] PortScan Detected on Port: 445 (14.161.24.1)
2019-07-03 16:52:06
36.236.23.135 attackbotsspam
37215/tcp
[2019-07-03]1pkt
2019-07-03 17:36:10
77.247.110.146 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-03 17:10:41
35.198.139.43 attackspambots
Jul  3 03:45:17 aat-srv002 sshd[4276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.198.139.43
Jul  3 03:45:19 aat-srv002 sshd[4276]: Failed password for invalid user papernet from 35.198.139.43 port 49002 ssh2
Jul  3 03:47:38 aat-srv002 sshd[4327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.198.139.43
Jul  3 03:47:40 aat-srv002 sshd[4327]: Failed password for invalid user ethos from 35.198.139.43 port 46436 ssh2
...
2019-07-03 16:48:45
41.64.194.205 attackspam
445/tcp
[2019-07-03]1pkt
2019-07-03 17:35:14
201.242.35.43 attackspam
445/tcp
[2019-07-03]1pkt
2019-07-03 17:21:01

Recently Reported IPs

164.68.127.206 164.68.127.117 20.106.166.207 18.63.253.122
78.110.253.220 87.236.176.226 147.91.217.246 35.5.157.158
157.80.101.11 134.60.44.30 177.100.46.9 24.245.179.225
81.202.68.215 1.54.64.200 36.201.185.231 46.65.115.121
137.161.6.34 141.40.212.239 245.15.199.77 96.94.138.100