Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Gevelsberg

Region: Nordrhein-Westfalen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.117.149.180
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11839
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;92.117.149.180.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011801 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 19 04:57:30 CST 2025
;; MSG SIZE  rcvd: 107
Host info
180.149.117.92.in-addr.arpa domain name pointer i5C7595B4.versanet.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
180.149.117.92.in-addr.arpa	name = i5C7595B4.versanet.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.116.112.4 attack
TCP Port: 25      invalid blocked  dnsbl-sorbs also abuseat-org and barracuda           (458)
2020-01-03 03:56:57
101.89.80.1 attack
SSH login attempts with user root at 2020-01-02.
2020-01-03 03:41:14
123.142.108.122 attack
Jan  2 16:54:10 sd-53420 sshd\[28120\]: Invalid user usuario from 123.142.108.122
Jan  2 16:54:10 sd-53420 sshd\[28120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.142.108.122
Jan  2 16:54:11 sd-53420 sshd\[28120\]: Failed password for invalid user usuario from 123.142.108.122 port 60476 ssh2
Jan  2 16:58:09 sd-53420 sshd\[29359\]: Invalid user tiger57a7 from 123.142.108.122
Jan  2 16:58:09 sd-53420 sshd\[29359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.142.108.122
...
2020-01-03 04:01:49
123.252.188.182 attack
01/02/2020-09:55:04.826617 123.252.188.182 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-01-03 03:34:03
103.138.5.3 attackbotsspam
web Attack on Website at 2020-01-02.
2020-01-03 03:39:47
61.69.78.78 attack
Jan  2 16:59:29 game-panel sshd[27454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.69.78.78
Jan  2 16:59:30 game-panel sshd[27454]: Failed password for invalid user bsd from 61.69.78.78 port 45674 ssh2
Jan  2 17:02:43 game-panel sshd[27596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.69.78.78
2020-01-03 03:50:32
106.12.100.1 attack
SSH login attempts with user root at 2020-01-02.
2020-01-03 03:29:12
106.12.211.2 attack
SSH login attempts with user root at 2020-01-02.
2020-01-03 03:27:50
27.124.32.12 attackspam
*Port Scan* detected from 27.124.32.12 (US/United States/-). 4 hits in the last 155 seconds
2020-01-03 03:35:50
106.13.125.159 attackbotsspam
2020-01-02T15:51:14.982840vps751288.ovh.net sshd\[22008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.125.159  user=root
2020-01-02T15:51:16.888835vps751288.ovh.net sshd\[22008\]: Failed password for root from 106.13.125.159 port 54564 ssh2
2020-01-02T15:54:42.273916vps751288.ovh.net sshd\[22022\]: Invalid user cisco from 106.13.125.159 port 48450
2020-01-02T15:54:42.282423vps751288.ovh.net sshd\[22022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.125.159
2020-01-02T15:54:44.745109vps751288.ovh.net sshd\[22022\]: Failed password for invalid user cisco from 106.13.125.159 port 48450 ssh2
2020-01-03 03:48:59
159.192.143.20 attackbots
Jan  2 15:54:44 ks10 sshd[28353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.143.20 
Jan  2 15:54:46 ks10 sshd[28353]: Failed password for invalid user admin from 159.192.143.20 port 32901 ssh2
...
2020-01-03 03:46:40
107.170.20.247 attack
Jan  2 19:26:57 dev0-dcde-rnet sshd[7569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.20.247
Jan  2 19:27:00 dev0-dcde-rnet sshd[7569]: Failed password for invalid user testtest from 107.170.20.247 port 58429 ssh2
Jan  2 19:45:46 dev0-dcde-rnet sshd[7795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.20.247
2020-01-03 03:48:32
104.248.163.1 attackbotsspam
web Attack on Website at 2020-01-02.
2020-01-03 03:30:09
61.177.172.128 attackspambots
Jan  2 20:35:41 * sshd[23400]: Failed password for root from 61.177.172.128 port 31769 ssh2
Jan  2 20:35:44 * sshd[23400]: Failed password for root from 61.177.172.128 port 31769 ssh2
2020-01-03 03:42:19
185.142.236.35 attack
Unauthorized connection attempt detected from IP address 185.142.236.35 to port 1604
2020-01-03 04:01:15

Recently Reported IPs

172.107.174.164 76.30.22.254 219.242.102.204 181.86.144.39
185.233.106.39 75.13.213.130 114.208.244.26 227.17.173.125
0.63.199.222 28.128.156.96 94.126.6.31 205.84.158.228
239.164.46.77 3.188.105.79 23.192.39.94 78.87.240.248
237.229.123.153 199.51.181.120 178.229.8.176 98.171.209.29