Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Badajoz

Region: Comunidad Autónoma de Extremadura

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.49.42.95
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24717
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;158.49.42.95.			IN	A

;; AUTHORITY SECTION:
.			398	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051400 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 14 15:13:08 CST 2023
;; MSG SIZE  rcvd: 105
Host info
Host 95.42.49.158.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 95.42.49.158.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
141.98.9.162 attackbots
5x Failed Password
2020-09-15 04:58:40
78.72.123.217 attackbotsspam
Sep 14 19:02:48 ssh2 sshd[50875]: User root from 78-72-123-217-no2410.tbcn.telia.com not allowed because not listed in AllowUsers
Sep 14 19:02:48 ssh2 sshd[50875]: Failed password for invalid user root from 78.72.123.217 port 56570 ssh2
Sep 14 19:02:48 ssh2 sshd[50875]: Connection closed by invalid user root 78.72.123.217 port 56570 [preauth]
...
2020-09-15 05:00:22
51.83.42.212 attackspam
$f2bV_matches
2020-09-15 04:53:00
159.89.199.182 attackbots
Sep 14 22:07:17 marvibiene sshd[14570]: Failed password for root from 159.89.199.182 port 52896 ssh2
Sep 14 22:17:30 marvibiene sshd[15251]: Failed password for root from 159.89.199.182 port 47024 ssh2
Sep 14 22:21:34 marvibiene sshd[15487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.199.182
2020-09-15 05:05:35
139.155.79.35 attackbotsspam
Brute-force attempt banned
2020-09-15 04:28:10
167.172.156.227 attackspambots
Sep 14 20:22:03 *** sshd[16493]: User root from 167.172.156.227 not allowed because not listed in AllowUsers
2020-09-15 04:52:03
49.148.254.240 attackbotsspam
Icarus honeypot on github
2020-09-15 04:33:02
85.172.11.101 attackbotsspam
Sep 14 21:12:31 vps647732 sshd[11535]: Failed password for root from 85.172.11.101 port 34102 ssh2
...
2020-09-15 04:29:19
23.101.183.9 attack
2020-09-14T14:49:05.370737morrigan.ad5gb.com sshd[2031124]: Disconnected from authenticating user root 23.101.183.9 port 40202 [preauth]
2020-09-15 04:35:25
51.178.46.95 attackspam
(sshd) Failed SSH login from 51.178.46.95 (FR/France/95.ip-51-178-46.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 14 12:44:31 server sshd[29291]: Failed password for root from 51.178.46.95 port 34850 ssh2
Sep 14 12:50:36 server sshd[31127]: Failed password for root from 51.178.46.95 port 36726 ssh2
Sep 14 12:53:47 server sshd[32383]: Failed password for root from 51.178.46.95 port 34136 ssh2
Sep 14 12:56:55 server sshd[1088]: Failed password for root from 51.178.46.95 port 59778 ssh2
Sep 14 13:00:06 server sshd[2227]: Failed password for root from 51.178.46.95 port 57190 ssh2
2020-09-15 05:01:15
109.177.48.130 attackspam
firewall-block, port(s): 8291/tcp
2020-09-15 05:02:42
36.37.201.133 attack
2020-09-14T13:03:32.719177mail.thespaminator.com sshd[20616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.37.201.133  user=root
2020-09-14T13:03:34.468635mail.thespaminator.com sshd[20616]: Failed password for root from 36.37.201.133 port 45688 ssh2
...
2020-09-15 04:35:07
182.185.144.96 attackspam
Unauthorized connection attempt from IP address 182.185.144.96 on Port 445(SMB)
2020-09-15 04:38:33
46.101.245.176 attackspambots
2020-09-14T14:16:18.931004yoshi.linuxbox.ninja sshd[953]: Failed password for invalid user admin from 46.101.245.176 port 46328 ssh2
2020-09-14T14:19:45.915836yoshi.linuxbox.ninja sshd[3233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.245.176  user=root
2020-09-14T14:19:47.673251yoshi.linuxbox.ninja sshd[3233]: Failed password for root from 46.101.245.176 port 47410 ssh2
...
2020-09-15 04:30:36
80.90.90.246 attack
SSH_attack
2020-09-15 04:45:56

Recently Reported IPs

124.16.189.96 140.116.154.135 148.88.245.216 140.116.67.28
193.224.158.44 177.36.80.9 149.169.144.200 14.139.45.242
140.116.110.80 155.43.76.6 134.169.108.250 156.0.134.109
141.85.0.97 140.116.249.4 195.130.121.48 114.79.55.23
124.16.186.30 159.226.59.158 134.83.3.77 140.115.214.170