Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 95.149.53.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23311
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;95.149.53.105.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 22:31:56 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 105.53.149.95.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 105.53.149.95.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.216.98.68 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 20-12-2019 14:50:42.
2019-12-21 03:28:54
104.236.31.227 attackbots
Dec 20 15:50:32 lnxweb61 sshd[25561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.31.227
2019-12-21 03:42:33
134.209.237.55 attackbots
$f2bV_matches
2019-12-21 03:49:30
123.19.196.192 attackbotsspam
Dec 20 15:50:32 grey postfix/smtpd\[19282\]: NOQUEUE: reject: RCPT from unknown\[123.19.196.192\]: 554 5.7.1 Service unavailable\; Client host \[123.19.196.192\] blocked using dul.dnsbl.sorbs.net\; Dynamic IP Addresses See: http://www.sorbs.net/lookup.shtml\?123.19.196.192\; from=\ to=\ proto=ESMTP helo=\<\[123.19.196.192\]\>
...
2019-12-21 03:43:09
40.92.4.84 attackspam
Dec 20 17:50:37 debian-2gb-vpn-nbg1-1 kernel: [1231795.975752] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.4.84 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=229 ID=45425 DF PROTO=TCP SPT=41825 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0
2019-12-21 03:36:45
111.241.18.20 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 20-12-2019 14:50:21.
2019-12-21 03:55:37
222.186.175.148 attack
Dec 20 20:20:34 root sshd[7825]: Failed password for root from 222.186.175.148 port 28836 ssh2
Dec 20 20:20:37 root sshd[7825]: Failed password for root from 222.186.175.148 port 28836 ssh2
Dec 20 20:20:41 root sshd[7825]: Failed password for root from 222.186.175.148 port 28836 ssh2
Dec 20 20:20:44 root sshd[7825]: Failed password for root from 222.186.175.148 port 28836 ssh2
...
2019-12-21 03:24:19
118.96.43.20 attackbotsspam
1576853443 - 12/20/2019 15:50:43 Host: 118.96.43.20/118.96.43.20 Port: 445 TCP Blocked
2019-12-21 03:28:15
125.165.156.226 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 20-12-2019 14:50:36.
2019-12-21 03:38:42
157.245.235.244 attackbots
Dec 20 19:54:22 ns41 sshd[30728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.235.244
Dec 20 19:54:22 ns41 sshd[30728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.235.244
2019-12-21 03:22:26
14.207.198.252 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 20-12-2019 14:50:38.
2019-12-21 03:35:12
185.176.27.178 attack
Dec 20 20:43:37 debian-2gb-nbg1-2 kernel: \[523778.033969\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.178 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=718 PROTO=TCP SPT=59403 DPT=31475 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-21 03:53:51
154.236.162.171 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 20-12-2019 14:50:40.
2019-12-21 03:33:09
180.253.209.218 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 20-12-2019 14:50:44.
2019-12-21 03:25:05
118.174.192.170 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 20-12-2019 14:50:32.
2019-12-21 03:45:10

Recently Reported IPs

132.116.80.4 210.80.90.195 142.81.134.143 231.4.77.59
151.13.48.159 241.177.114.39 125.164.163.74 152.171.210.242
92.51.12.111 201.99.226.106 244.237.71.107 247.60.204.79
45.129.2.22 165.107.219.13 57.106.232.12 197.248.175.67
230.39.86.196 118.225.201.71 25.160.116.156 131.11.49.250