Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.49.134.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63641
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.49.134.162.			IN	A

;; AUTHORITY SECTION:
.			495	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024051300 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 13 14:53:35 CST 2024
;; MSG SIZE  rcvd: 105
Host info
Host 162.134.49.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 162.134.49.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
200.117.185.230 attackspambots
k+ssh-bruteforce
2020-03-28 06:09:41
187.190.236.88 attackspambots
Mar 27 22:18:26 mailserver sshd\[4159\]: Invalid user andie from 187.190.236.88
...
2020-03-28 05:59:45
103.221.252.46 attackbotsspam
Brute force attempt
2020-03-28 06:07:19
222.186.52.139 attackbotsspam
2020-03-27T22:42:11.860985vps773228.ovh.net sshd[20783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.139  user=root
2020-03-27T22:42:13.701949vps773228.ovh.net sshd[20783]: Failed password for root from 222.186.52.139 port 15420 ssh2
2020-03-27T22:42:11.860985vps773228.ovh.net sshd[20783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.139  user=root
2020-03-27T22:42:13.701949vps773228.ovh.net sshd[20783]: Failed password for root from 222.186.52.139 port 15420 ssh2
2020-03-27T22:42:16.050705vps773228.ovh.net sshd[20783]: Failed password for root from 222.186.52.139 port 15420 ssh2
...
2020-03-28 05:52:18
222.92.203.58 attackspambots
fail2ban/Mar 27 21:39:59 h1962932 sshd[3011]: Invalid user qpi from 222.92.203.58 port 37008
Mar 27 21:39:59 h1962932 sshd[3011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.92.203.58
Mar 27 21:39:59 h1962932 sshd[3011]: Invalid user qpi from 222.92.203.58 port 37008
Mar 27 21:40:00 h1962932 sshd[3011]: Failed password for invalid user qpi from 222.92.203.58 port 37008 ssh2
Mar 27 21:42:55 h1962932 sshd[3130]: Invalid user helene from 222.92.203.58 port 59070
2020-03-28 05:47:50
187.35.91.198 attack
Mar 27 14:28:07 mockhub sshd[11313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.35.91.198
Mar 27 14:28:09 mockhub sshd[11313]: Failed password for invalid user nessa from 187.35.91.198 port 14785 ssh2
...
2020-03-28 06:14:28
202.238.61.137 attack
$f2bV_matches
2020-03-28 06:18:19
118.25.36.79 attack
Mar 27 22:55:07 santamaria sshd\[1637\]: Invalid user krq from 118.25.36.79
Mar 27 22:55:07 santamaria sshd\[1637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.36.79
Mar 27 22:55:09 santamaria sshd\[1637\]: Failed password for invalid user krq from 118.25.36.79 port 39128 ssh2
...
2020-03-28 06:03:08
180.153.28.115 attackspambots
Mar 27 21:40:28 game-panel sshd[5205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.153.28.115
Mar 27 21:40:30 game-panel sshd[5205]: Failed password for invalid user otd from 180.153.28.115 port 52062 ssh2
Mar 27 21:42:32 game-panel sshd[5271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.153.28.115
2020-03-28 05:46:10
177.1.214.84 attackspam
Mar 27 17:49:40 ny01 sshd[8728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.1.214.84
Mar 27 17:49:42 ny01 sshd[8728]: Failed password for invalid user test from 177.1.214.84 port 24165 ssh2
Mar 27 17:54:15 ny01 sshd[10519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.1.214.84
2020-03-28 05:57:01
128.140.23.74 attack
This is one of the many ip's ,all from the same city) that started a network attack from my dvr.
2020-03-28 06:25:11
222.186.30.35 attackbotsspam
03/27/2020-18:23:24.513958 222.186.30.35 Protocol: 6 ET SCAN Potential SSH Scan
2020-03-28 06:23:36
185.36.81.78 attack
Mar 27 20:31:38 mail postfix/smtpd\[31466\]: warning: unknown\[185.36.81.78\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Mar 27 21:00:42 mail postfix/smtpd\[32601\]: warning: unknown\[185.36.81.78\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Mar 27 21:58:48 mail postfix/smtpd\[1088\]: warning: unknown\[185.36.81.78\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Mar 27 22:27:49 mail postfix/smtpd\[2098\]: warning: unknown\[185.36.81.78\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-03-28 06:02:49
182.140.133.153 attack
CMS (WordPress or Joomla) login attempt.
2020-03-28 05:50:09
201.174.9.98 attackbotsspam
Mar 27 22:07:37 ns392434 sshd[21605]: Invalid user mike from 201.174.9.98 port 35928
Mar 27 22:07:37 ns392434 sshd[21605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.174.9.98
Mar 27 22:07:37 ns392434 sshd[21605]: Invalid user mike from 201.174.9.98 port 35928
Mar 27 22:07:39 ns392434 sshd[21605]: Failed password for invalid user mike from 201.174.9.98 port 35928 ssh2
Mar 27 22:15:17 ns392434 sshd[22375]: Invalid user dso from 201.174.9.98 port 45326
Mar 27 22:15:17 ns392434 sshd[22375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.174.9.98
Mar 27 22:15:17 ns392434 sshd[22375]: Invalid user dso from 201.174.9.98 port 45326
Mar 27 22:15:20 ns392434 sshd[22375]: Failed password for invalid user dso from 201.174.9.98 port 45326 ssh2
Mar 27 22:18:45 ns392434 sshd[22781]: Invalid user faraim from 201.174.9.98 port 58454
2020-03-28 05:46:38

Recently Reported IPs

1.109.119.50 23.225.121.179 1.192.240.190 38.90.19.146
158.51.155.240 133.185.191.54 111.190.150.206 120.245.61.193
34.96.126.106 23.225.121.187 23.225.121.220 35.78.176.77
147.76.63.187 185.191.126.213 23.225.183.22 23.225.183.64
120.245.60.213 157.230.79.136 76.76.21.164 65.108.99.41