Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.226.18.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32736
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.226.18.49.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 23:12:23 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 49.18.226.130.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.18.226.130.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
141.98.81.253 attackspambots
Attempted to establish connection to non opened port 33892
2020-08-06 07:21:26
222.186.180.142 attackspambots
Aug  5 23:27:11 scw-6657dc sshd[29477]: Failed password for root from 222.186.180.142 port 23136 ssh2
Aug  5 23:27:11 scw-6657dc sshd[29477]: Failed password for root from 222.186.180.142 port 23136 ssh2
Aug  5 23:27:13 scw-6657dc sshd[29477]: Failed password for root from 222.186.180.142 port 23136 ssh2
...
2020-08-06 07:28:39
218.92.0.248 attackspam
2020-08-05T22:55:22.492902shield sshd\[10902\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.248  user=root
2020-08-05T22:55:24.667347shield sshd\[10902\]: Failed password for root from 218.92.0.248 port 45560 ssh2
2020-08-05T22:55:27.835653shield sshd\[10902\]: Failed password for root from 218.92.0.248 port 45560 ssh2
2020-08-05T22:55:31.213254shield sshd\[10902\]: Failed password for root from 218.92.0.248 port 45560 ssh2
2020-08-05T22:55:34.351228shield sshd\[10902\]: Failed password for root from 218.92.0.248 port 45560 ssh2
2020-08-06 06:55:52
103.23.100.87 attack
"fail2ban match"
2020-08-06 07:24:23
106.13.149.57 attackbots
Aug  5 22:34:36 buvik sshd[451]: Failed password for root from 106.13.149.57 port 48492 ssh2
Aug  5 22:38:29 buvik sshd[1069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.149.57  user=root
Aug  5 22:38:31 buvik sshd[1069]: Failed password for root from 106.13.149.57 port 48508 ssh2
...
2020-08-06 07:13:28
188.166.23.215 attack
2020-08-05T22:38:53.473879+02:00  sshd[5162]: Failed password for root from 188.166.23.215 port 41964 ssh2
2020-08-06 06:54:20
102.177.145.221 attackspambots
Aug  6 00:30:03 jane sshd[18522]: Failed password for root from 102.177.145.221 port 42738 ssh2
...
2020-08-06 06:58:22
106.54.255.11 attackbots
SSH Brute Force
2020-08-06 06:57:06
185.21.39.46 attackspambots
Dovecot Invalid User Login Attempt.
2020-08-06 07:08:32
118.126.105.190 attack
Aug  4 07:50:22 server770 sshd[8735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.105.190  user=r.r
Aug  4 07:50:24 server770 sshd[8735]: Failed password for r.r from 118.126.105.190 port 42846 ssh2
Aug  4 07:50:24 server770 sshd[8735]: Received disconnect from 118.126.105.190 port 42846:11: Bye Bye [preauth]
Aug  4 07:50:24 server770 sshd[8735]: Disconnected from 118.126.105.190 port 42846 [preauth]
Aug  4 08:08:34 server770 sshd[8934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.105.190  user=r.r
Aug  4 08:08:35 server770 sshd[8934]: Failed password for r.r from 118.126.105.190 port 47534 ssh2
Aug  4 08:08:35 server770 sshd[8934]: Received disconnect from 118.126.105.190 port 47534:11: Bye Bye [preauth]
Aug  4 08:08:35 server770 sshd[8934]: Disconnected from 118.126.105.190 port 47534 [preauth]
Aug  4 08:12:01 server770 sshd[9136]: pam_unix(sshd:auth): authenticatio........
-------------------------------
2020-08-06 07:12:57
210.22.94.42 attackbots
Aug  6 01:17:44 minden010 sshd[12456]: Failed password for root from 210.22.94.42 port 44934 ssh2
Aug  6 01:21:46 minden010 sshd[13818]: Failed password for root from 210.22.94.42 port 50195 ssh2
...
2020-08-06 07:29:10
1.255.153.167 attackbotsspam
$f2bV_matches
2020-08-06 07:30:58
112.172.147.34 attackbots
Aug  5 13:35:11 pixelmemory sshd[3929404]: Failed password for root from 112.172.147.34 port 19145 ssh2
Aug  5 13:36:42 pixelmemory sshd[3933618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.172.147.34  user=root
Aug  5 13:36:43 pixelmemory sshd[3933618]: Failed password for root from 112.172.147.34 port 42023 ssh2
Aug  5 13:38:13 pixelmemory sshd[3938501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.172.147.34  user=root
Aug  5 13:38:15 pixelmemory sshd[3938501]: Failed password for root from 112.172.147.34 port 64899 ssh2
...
2020-08-06 07:23:21
72.15.69.12 attackbotsspam
2020-08-05T20:38:16.445721randservbullet-proofcloud-66.localdomain sshd[2197]: Invalid user admin from 72.15.69.12 port 46855
2020-08-05T20:38:16.564227randservbullet-proofcloud-66.localdomain sshd[2197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=cmcust1a-69.12.nulinkdigital.com
2020-08-05T20:38:16.445721randservbullet-proofcloud-66.localdomain sshd[2197]: Invalid user admin from 72.15.69.12 port 46855
2020-08-05T20:38:19.458800randservbullet-proofcloud-66.localdomain sshd[2197]: Failed password for invalid user admin from 72.15.69.12 port 46855 ssh2
...
2020-08-06 07:19:34
35.240.48.19 attack
$f2bV_matches
2020-08-06 06:49:36

Recently Reported IPs

82.201.43.184 115.47.199.132 229.1.123.66 161.81.17.159
139.249.232.214 98.170.57.27 82.206.253.135 236.228.197.30
68.27.90.31 163.134.236.186 180.30.194.219 136.90.65.30
69.182.13.60 227.153.3.57 52.228.47.80 233.154.161.125
244.173.201.57 5.137.54.170 19.29.130.252 160.102.19.25