IP Address: 199.45.154.149


Stats (UTC)

Discuss this ip address


Add comment...

Recent submissions


Reported by
Timestamp
Notes
Flags
System
11 days ago
[probe-44-49] 2026-02-22 04:45:12, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
24 days ago
[probe-44-49] 2026-02-09 07:13:32, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-168-134] 2026-01-23 07:44:07, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
ipban 1.9.0 - 14
BruteForce
RDP
one month ago
[probe-44-49] 2026-01-08 14:42:15, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[arem1] 2026-01-06 10:31:19, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-168-134] 2026-01-01 23:49:28, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
ipban 3.1.0 - 14
BruteForce
RDP
2 months ago
[probe-168-134] 2025-12-29 07:38:36, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
ric404
2 months ago
ipban 3.0.0 - 4653
BruteForce
RDP
2 months ago
fail2ban
BruteForce
postfix
2 months ago
fail2ban
BruteForce
postfix
Tsuwado
3 months ago
ipban 3.1.0 - Policy violation. Connection refused.
BruteForce
MailEnable-2
3 months ago
[arem1] 2025-11-30 07:55:06, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Kamil
3 months ago
fail2ban
BruteForce
postfix
3 months ago
fail2ban
BruteForce
postfix
3 months ago
[rede-188] 2025-11-10 06:08:59, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
ipban 2.0.0 - 5152
BruteForce
RDP
5 months ago
[probe-168-134] 2025-09-29 15:08:15, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-44-49] 2025-09-21 13:20:35, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-168-134] 2025-09-20 12:00:52, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
Connection to port 5900 from port 58594
BruteForce
VNC
ric404
6 months ago
ipban 3.0.0 - 4653
BruteForce
RDP
6 months ago
[probe-44-49] 2025-08-25 15:57:12, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-168-134] 2025-08-22 08:01:07, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-44-49] 2025-08-13 23:18:42, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
6 months ago
[probe-44-49] 2025-08-12 06:06:58, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-07-19 05:33:17, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[arem1] 2025-07-11 20:30:25, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
Anonymous
8 months ago
ipban 1.8.0 - 14
BruteForce
RDP
8 months ago
[probe-176-124] 2025-06-26 17:16:09, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
8 months ago
fail2ban
BruteForce, Hacking, PortScan
postfix
8 months ago
fail2ban
BruteForce
postfix
8 months ago
[probe-176-124] 2025-06-20 13:34:45, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
8 months ago
[probe-44-49] 2025-06-18 07:00:20, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[probe-44-49] 2025-06-03 20:46:47, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
ipban 1.9.0 - 5152
BruteForce
RDP
9 months ago
[probe-176-124] 2025-05-20 08:15:00, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[probe-44-49] 2025-05-19 22:00:11, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
10 months ago
[probe-44-49] 2025-05-13 00:05:03, Client: 199.45.154.149, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
10 months ago
fail2ban
BruteForce
dovecot
10 months ago
Connection to port 5900 from port 55052
BruteForce
VNC
EugeneK
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
Deny
one year ago
fail2ban
BruteForce
nginx-403
one year ago
ipban 1.8.0
BruteForce
RDP
ric404
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
Kamil
one year ago
fail2ban
BruteForce
postfix
one year ago
ipban 1.8.0
BruteForce
RDP
Nudlz
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
imcas
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
imcas
one year ago
ipban 2.0.0 - 5152
BruteForce
RDP
Deny
one year ago
fail2ban
BruteForce
nginx-404
one year ago
ipban 1.8.0
BruteForce
RDP
imcas
one year ago
ipban 2.0.0 - 5152
BruteForce
RDP
imcas
one year ago
ipban 2.0.0 - 5152
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
imcas
one year ago
ipban 2.0.0 - 5152
BruteForce
RDP
imcas
one year ago
ipban 2.0.0 - 5152
BruteForce
RDP
Anonymous
one year ago
port/24608
Hacking
TCP
Anonymous
one year ago
port/9182
Hacking
TCP
imcas
one year ago
ipban 2.0.0 - 5152
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
imcas
one year ago
ipban 2.0.0 - 5152
BruteForce
RDP
Contact IPThreat