Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Madrid

Region: Comunidad de Madrid

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       158.158.0.0 - 158.158.255.255
CIDR:           158.158.0.0/16
NetName:        APNIC
NetHandle:      NET-158-158-0-0-1
Parent:         NET158 (NET-158-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2019-04-16
Updated:        2019-04-16
Ref:            https://rdap.arin.net/registry/ip/158.158.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois://whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  http://wq.apnic.net/whois-search/static/search.html

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '158.158.0.0 - 158.158.255.255'

% Abuse contact for '158.158.0.0 - 158.158.255.255' is 'abuse@microsoft.com'

inetnum:        158.158.0.0 - 158.158.255.255
netname:        MICROSOFT-APNIC-AP
descr:          Microsoft Singapore Pte. Ltd.
country:        SG
org:            ORG-MSPL4-AP
admin-c:        DB662-AP
tech-c:         MP234-AP
abuse-c:        AM2589-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-MOPL-SG
mnt-routes:     MAINT-MOPL-SG
mnt-lower:      MAINT-AP-MICROSOFT
mnt-routes:     MAINT-AP-MICROSOFT
mnt-irt:        IRT-MICROSOFT-APNIC-SG
mnt-irt:        IRT-MOPL-SG
last-modified:  2022-12-16T05:54:14Z
source:         APNIC

irt:            IRT-MICROSOFT-APNIC-SG
address:        One Microsft Way
address:        Redmond, WA 98052
address:        US
e-mail:         abuse@microsoft.com
abuse-mailbox:  abuse@microsoft.com
admin-c:        MP234-AP
tech-c:         MP234-AP
auth:           # Filtered
remarks:        abuse@microsoft.com is invalid
mnt-by:         MAINT-AP-MICROSOFT
last-modified:  2025-11-18T00:26:27Z
source:         APNIC

irt:            IRT-MOPL-SG
address:        80 Raffles Place,
e-mail:         abuse@microsoft.com
abuse-mailbox:  abuse@microsoft.com
admin-c:        MOPL1-AP
tech-c:         MOPL1-AP
auth:           # Filtered
remarks:        abuse@microsoft.com is invalid
mnt-by:         MAINT-MOPL-SG
last-modified:  2025-11-18T00:36:31Z
source:         APNIC

organisation:   ORG-MSPL4-AP
org-name:       Microsoft Singapore Pte. Ltd.
country:        US
address:        One Microsoft Way
phone:          +011-425-706-8080
fax-no:         +011-425-936-7329
e-mail:         dawn.bedard@microsoft.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2020-05-27T12:56:32Z
source:         APNIC

role:           ABUSE MICROSOFTAPNICSG
country:        ZZ
address:        One Microsft Way
address:        Redmond, WA 98052
address:        US
phone:          +000000000
e-mail:         abuse@microsoft.com
admin-c:        MP234-AP
tech-c:         MP234-AP
nic-hdl:        AM2589-AP
remarks:        Generated from irt object IRT-MICROSOFT-APNIC-SG
remarks:        abuse@microsoft.com is invalid
abuse-mailbox:  abuse@microsoft.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-04T18:10:10Z
source:         APNIC

person:         Dawn Bedard
address:        One Microsoft Way
country:        US
phone:          +0114257062751
e-mail:         dabedard@microsoft.com
nic-hdl:        DB662-AP
mnt-by:         MAINT-AP-MICROSOFT
last-modified:  2019-03-25T16:26:42Z
source:         APNIC

person:         MSFT POC
nic-hdl:        MP234-AP
e-mail:         iprrms@microsoft.com
address:        One Microsft Way
address:        Redmond, WA 98052
address:        US
phone:          +1-425-882-8080
country:        US
mnt-by:         MAINT-AP-MICROSOFT
last-modified:  2008-09-04T07:32:53Z
source:         APNIC

% Information related to '158.158.0.0/16AS8075'

route:          158.158.0.0/16
origin:         AS8075
descr:          Microsoft Singapore Pte. Ltd.
                One Microsoft Way
mnt-by:         MAINT-AP-MICROSOFT
mnt-by:         MAINT-MOPL-SG
last-modified:  2022-12-16T05:54:15Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.158.41.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14504
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;158.158.41.30.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040200 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 02 21:30:04 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 30.41.158.158.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 30.41.158.158.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.241.237.69 attackbots
Port Scan: Events[1] countPorts[1]: 139 ..
2020-04-18 04:14:22
192.99.33.202 attack
(smtpauth) Failed SMTP AUTH login from 192.99.33.202 (CA/Canada/ns525791.ip-192-99-33.net): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-17 23:53:16 login authenticator failed for ns525791.ip-192-99-33.net (ADMIN) [192.99.33.202]: 535 Incorrect authentication data (set_id=technical@sepahanpooyeh.com)
2020-04-18 04:23:02
212.64.12.236 attack
Apr 17 15:59:20 zn008 sshd[6811]: Invalid user vr from 212.64.12.236
Apr 17 15:59:20 zn008 sshd[6811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.12.236 
Apr 17 15:59:22 zn008 sshd[6811]: Failed password for invalid user vr from 212.64.12.236 port 46398 ssh2
Apr 17 15:59:22 zn008 sshd[6811]: Received disconnect from 212.64.12.236: 11: Bye Bye [preauth]
Apr 17 16:04:57 zn008 sshd[7198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.12.236  user=r.r
Apr 17 16:04:59 zn008 sshd[7198]: Failed password for r.r from 212.64.12.236 port 45510 ssh2
Apr 17 16:05:00 zn008 sshd[7198]: Received disconnect from 212.64.12.236: 11: Bye Bye [preauth]
Apr 17 16:11:01 zn008 sshd[7962]: Invalid user oracle from 212.64.12.236
Apr 17 16:11:01 zn008 sshd[7962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.12.236 
Apr 17 16:11:04 zn008 sshd[7962]........
-------------------------------
2020-04-18 04:04:19
128.199.72.96 attackbots
2020-04-17T19:59:21.116457abusebot-8.cloudsearch.cf sshd[26089]: Invalid user ubuntu from 128.199.72.96 port 45470
2020-04-17T19:59:21.127341abusebot-8.cloudsearch.cf sshd[26089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.72.96
2020-04-17T19:59:21.116457abusebot-8.cloudsearch.cf sshd[26089]: Invalid user ubuntu from 128.199.72.96 port 45470
2020-04-17T19:59:23.790117abusebot-8.cloudsearch.cf sshd[26089]: Failed password for invalid user ubuntu from 128.199.72.96 port 45470 ssh2
2020-04-17T20:02:57.910004abusebot-8.cloudsearch.cf sshd[26337]: Invalid user informix from 128.199.72.96 port 51336
2020-04-17T20:02:57.921590abusebot-8.cloudsearch.cf sshd[26337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.72.96
2020-04-17T20:02:57.910004abusebot-8.cloudsearch.cf sshd[26337]: Invalid user informix from 128.199.72.96 port 51336
2020-04-17T20:02:59.902090abusebot-8.cloudsearch.cf sshd[26337
...
2020-04-18 04:37:52
177.129.203.118 attack
SSH Brute-Force attacks
2020-04-18 04:35:06
187.18.108.73 attackbotsspam
SSH Brute Force
2020-04-18 04:23:18
180.76.158.82 attackbots
Port Scan: Events[1] countPorts[1]: 1182 ..
2020-04-18 04:26:27
68.183.193.148 attackspam
(sshd) Failed SSH login from 68.183.193.148 (CA/Canada/247labs.com-march-2020): 5 in the last 3600 secs
2020-04-18 04:24:08
79.120.118.82 attackspambots
Apr 17 21:43:45 h2779839 sshd[24458]: Invalid user admin from 79.120.118.82 port 49075
Apr 17 21:43:45 h2779839 sshd[24458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.120.118.82
Apr 17 21:43:45 h2779839 sshd[24458]: Invalid user admin from 79.120.118.82 port 49075
Apr 17 21:43:48 h2779839 sshd[24458]: Failed password for invalid user admin from 79.120.118.82 port 49075 ssh2
Apr 17 21:47:13 h2779839 sshd[24523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.120.118.82  user=root
Apr 17 21:47:15 h2779839 sshd[24523]: Failed password for root from 79.120.118.82 port 51829 ssh2
Apr 17 21:50:34 h2779839 sshd[24608]: Invalid user ud from 79.120.118.82 port 54595
Apr 17 21:50:34 h2779839 sshd[24608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.120.118.82
Apr 17 21:50:34 h2779839 sshd[24608]: Invalid user ud from 79.120.118.82 port 54595
Apr 17 21:50:36 h
...
2020-04-18 04:25:40
218.92.0.171 attackspam
Apr 17 19:56:23 ip-172-31-61-156 sshd[25245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171  user=root
Apr 17 19:56:25 ip-172-31-61-156 sshd[25245]: Failed password for root from 218.92.0.171 port 44806 ssh2
Apr 17 19:56:28 ip-172-31-61-156 sshd[25245]: Failed password for root from 218.92.0.171 port 44806 ssh2
Apr 17 19:56:36 ip-172-31-61-156 sshd[25245]: error: maximum authentication attempts exceeded for root from 218.92.0.171 port 44806 ssh2 [preauth]
Apr 17 19:56:36 ip-172-31-61-156 sshd[25245]: Disconnecting: Too many authentication failures [preauth]
...
2020-04-18 04:03:48
111.229.78.120 attack
Fail2Ban Ban Triggered
2020-04-18 04:29:45
118.24.140.195 attack
Apr 17 21:18:55 mail sshd\[30733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.140.195  user=root
Apr 17 21:18:56 mail sshd\[30733\]: Failed password for root from 118.24.140.195 port 55392 ssh2
Apr 17 21:23:43 mail sshd\[30835\]: Invalid user dm from 118.24.140.195
Apr 17 21:23:43 mail sshd\[30835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.140.195
...
2020-04-18 03:58:11
216.245.195.18 attackbotsspam
please block this spam email
2020-04-18 04:40:51
111.67.199.188 attackbots
(sshd) Failed SSH login from 111.67.199.188 (CN/China/-): 5 in the last 3600 secs
2020-04-18 04:17:39
122.51.93.233 attackspambots
Apr 17 21:16:03 MainVPS sshd[23084]: Invalid user ov from 122.51.93.233 port 57154
Apr 17 21:16:03 MainVPS sshd[23084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.93.233
Apr 17 21:16:03 MainVPS sshd[23084]: Invalid user ov from 122.51.93.233 port 57154
Apr 17 21:16:06 MainVPS sshd[23084]: Failed password for invalid user ov from 122.51.93.233 port 57154 ssh2
Apr 17 21:23:27 MainVPS sshd[29469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.93.233  user=root
Apr 17 21:23:29 MainVPS sshd[29469]: Failed password for root from 122.51.93.233 port 34418 ssh2
...
2020-04-18 04:14:51

Recently Reported IPs

2606:4700:10::ac43:1108 2606:4700:10::ac43:1655 2606:4700:10::ac43:142e 110.78.158.243
2606:4700:10::ac43:2491 110.78.138.90 2606:4700:10::6814:9972 14.207.194.58
2606:4700:10::6816:380d 115.45.40.103 103.195.103.66 2606:4700:10::ac43:1291
2606:4700:10::6814:8725 2606:4700:10::6814:8039 66.132.172.208 45.131.195.181
45.131.195.180 212.135.40.37 2606:4700:10::6816:1984 110.77.226.205