Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: West Hartford

Region: Connecticut

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.49.213.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55701
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;137.49.213.164.			IN	A

;; AUTHORITY SECTION:
.			521	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070200 1800 900 604800 86400

;; Query time: 95 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 02 16:28:41 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 164.213.49.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.213.49.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.35.232 attackbots
Apr  9 11:53:42 gw1 sshd[6125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.35.232
Apr  9 11:53:44 gw1 sshd[6125]: Failed password for invalid user admin from 106.13.35.232 port 38708 ssh2
...
2020-04-09 14:54:19
129.204.63.100 attackspam
Fail2Ban Ban Triggered (2)
2020-04-09 14:21:52
202.77.105.100 attack
Apr  9 08:08:58 server sshd\[30899\]: Invalid user steve from 202.77.105.100
Apr  9 08:08:58 server sshd\[30899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.77.105.100 
Apr  9 08:09:00 server sshd\[30899\]: Failed password for invalid user steve from 202.77.105.100 port 40318 ssh2
Apr  9 08:14:16 server sshd\[32105\]: Invalid user ts3sleep from 202.77.105.100
Apr  9 08:14:16 server sshd\[32105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.77.105.100 
...
2020-04-09 14:33:38
181.48.28.13 attackbotsspam
2020-04-09T06:49:02.182611homeassistant sshd[17797]: Invalid user shop1 from 181.48.28.13 port 58646
2020-04-09T06:49:02.194694homeassistant sshd[17797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.28.13
...
2020-04-09 14:53:50
94.247.180.153 attackbots
Apr  8 12:34:35 finn sshd[15439]: Invalid user test from 94.247.180.153 port 39368
Apr  8 12:34:35 finn sshd[15439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.247.180.153
Apr  8 12:34:37 finn sshd[15439]: Failed password for invalid user test from 94.247.180.153 port 39368 ssh2
Apr  8 12:34:37 finn sshd[15439]: Received disconnect from 94.247.180.153 port 39368:11: Bye Bye [preauth]
Apr  8 12:34:37 finn sshd[15439]: Disconnected from 94.247.180.153 port 39368 [preauth]
Apr  8 12:38:53 finn sshd[16581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.247.180.153  user=postgres
Apr  8 12:38:55 finn sshd[16581]: Failed password for postgres from 94.247.180.153 port 40252 ssh2
Apr  8 12:38:55 finn sshd[16581]: Received disconnect from 94.247.180.153 port 40252:11: Bye Bye [preauth]
Apr  8 12:38:55 finn sshd[16581]: Disconnected from 94.247.180.153 port 40252 [preauth]


........
--------------------------------------------
2020-04-09 15:00:40
71.83.123.141 spambotsattackproxynormal
Sent attack
2020-04-09 15:00:00
111.231.75.83 attackspam
Apr  9 08:53:19 server sshd\[8513\]: Invalid user ts3server3 from 111.231.75.83
Apr  9 08:53:19 server sshd\[8513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.75.83 
Apr  9 08:53:21 server sshd\[8513\]: Failed password for invalid user ts3server3 from 111.231.75.83 port 42690 ssh2
Apr  9 09:12:18 server sshd\[12864\]: Invalid user ns2 from 111.231.75.83
Apr  9 09:12:18 server sshd\[12864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.75.83 
...
2020-04-09 14:57:45
58.143.169.105 attackspam
Apr  9 00:54:02 firewall sshd[18497]: Invalid user admin from 58.143.169.105
Apr  9 00:54:04 firewall sshd[18497]: Failed password for invalid user admin from 58.143.169.105 port 54785 ssh2
Apr  9 00:54:11 firewall sshd[18558]: Invalid user admin from 58.143.169.105
...
2020-04-09 14:50:57
111.20.68.34 attack
04/09/2020-00:04:36.067594 111.20.68.34 Protocol: 1 GPL ICMP_INFO PING Flowpoint2200 or Network Management Software
2020-04-09 14:22:30
106.12.220.19 attackspambots
2020-04-09T05:49:50.659797centos sshd[26265]: Invalid user odoo from 106.12.220.19 port 53918
2020-04-09T05:49:52.412341centos sshd[26265]: Failed password for invalid user odoo from 106.12.220.19 port 53918 ssh2
2020-04-09T05:54:07.454596centos sshd[26555]: Invalid user oracle from 106.12.220.19 port 52988
...
2020-04-09 14:53:02
106.75.49.143 attackspam
Apr  9 08:16:33 mailserver sshd\[23952\]: Invalid user ts3user from 106.75.49.143
...
2020-04-09 14:40:48
104.209.170.163 attackbotsspam
$lgm
2020-04-09 14:36:24
123.206.51.192 attackspam
2020-04-09T06:55:03.972861vps751288.ovh.net sshd\[14516\]: Invalid user test from 123.206.51.192 port 56148
2020-04-09T06:55:03.983195vps751288.ovh.net sshd\[14516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.51.192
2020-04-09T06:55:06.245504vps751288.ovh.net sshd\[14516\]: Failed password for invalid user test from 123.206.51.192 port 56148 ssh2
2020-04-09T06:59:08.121056vps751288.ovh.net sshd\[14550\]: Invalid user deployer from 123.206.51.192 port 42520
2020-04-09T06:59:08.131709vps751288.ovh.net sshd\[14550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.51.192
2020-04-09 14:32:08
206.189.98.225 attackbots
Apr  9 07:40:12 vserver sshd\[26300\]: Invalid user uftp from 206.189.98.225Apr  9 07:40:14 vserver sshd\[26300\]: Failed password for invalid user uftp from 206.189.98.225 port 58054 ssh2Apr  9 07:49:41 vserver sshd\[26368\]: Invalid user project from 206.189.98.225Apr  9 07:49:43 vserver sshd\[26368\]: Failed password for invalid user project from 206.189.98.225 port 42668 ssh2
...
2020-04-09 14:27:18
203.127.84.42 attackbots
Apr  9 06:38:27 sigma sshd\[24147\]: Invalid user newuser from 203.127.84.42Apr  9 06:38:29 sigma sshd\[24147\]: Failed password for invalid user newuser from 203.127.84.42 port 43297 ssh2
...
2020-04-09 14:24:18

Recently Reported IPs

143.232.83.171 110.221.31.73 203.114.163.141 177.159.43.54
5.9.131.76 212.14.189.254 13.116.47.143 149.153.63.247
81.255.120.242 217.231.39.7 192.37.107.231 128.77.25.81
139.41.135.70 169.87.183.131 209.254.64.135 188.201.186.35
196.58.93.111 121.232.6.83 58.194.130.50 206.204.15.181