Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.4.49.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36212
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.4.49.52.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 16:00:53 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 52.49.4.161.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.49.4.161.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
157.245.40.76 attackspambots
Automatic report - XMLRPC Attack
2020-06-01 12:49:53
222.186.42.136 attackspam
Jun  1 06:27:05 v22018053744266470 sshd[5530]: Failed password for root from 222.186.42.136 port 47093 ssh2
Jun  1 06:27:21 v22018053744266470 sshd[5548]: Failed password for root from 222.186.42.136 port 28344 ssh2
...
2020-06-01 12:28:25
157.245.122.248 attack
$f2bV_matches
2020-06-01 12:41:53
49.88.112.69 attack
2020-06-01T04:19:04.411342shield sshd\[30456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.69  user=root
2020-06-01T04:19:07.019949shield sshd\[30456\]: Failed password for root from 49.88.112.69 port 11475 ssh2
2020-06-01T04:19:09.573933shield sshd\[30456\]: Failed password for root from 49.88.112.69 port 11475 ssh2
2020-06-01T04:19:12.140836shield sshd\[30456\]: Failed password for root from 49.88.112.69 port 11475 ssh2
2020-06-01T04:29:02.794839shield sshd\[32346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.69  user=root
2020-06-01 12:36:05
190.114.65.151 attackbots
Jun  1 06:24:17 piServer sshd[25683]: Failed password for root from 190.114.65.151 port 56377 ssh2
Jun  1 06:27:18 piServer sshd[26140]: Failed password for root from 190.114.65.151 port 45634 ssh2
...
2020-06-01 12:44:56
24.16.139.106 attackspam
$f2bV_matches
2020-06-01 12:11:24
134.122.103.0 attackspambots
Automatic report - XMLRPC Attack
2020-06-01 12:23:19
165.22.121.41 attack
May 31 23:53:07 NPSTNNYC01T sshd[6363]: Failed password for root from 165.22.121.41 port 54564 ssh2
May 31 23:53:46 NPSTNNYC01T sshd[6476]: Failed password for root from 165.22.121.41 port 35040 ssh2
...
2020-06-01 12:49:00
27.18.226.150 attack
Fail2Ban Ban Triggered
2020-06-01 12:39:25
192.144.154.209 attack
Jun  1 05:59:21 vps333114 sshd[1107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.154.209  user=root
Jun  1 05:59:23 vps333114 sshd[1107]: Failed password for root from 192.144.154.209 port 54102 ssh2
...
2020-06-01 12:40:24
112.85.42.173 attackbotsspam
Jun  1 06:34:22 vmi345603 sshd[18297]: Failed password for root from 112.85.42.173 port 64311 ssh2
Jun  1 06:34:26 vmi345603 sshd[18297]: Failed password for root from 112.85.42.173 port 64311 ssh2
...
2020-06-01 12:34:58
122.116.10.78 attackbots
" "
2020-06-01 12:45:25
118.98.96.184 attackbotsspam
$f2bV_matches
2020-06-01 12:28:55
151.185.15.151 attackbotsspam
Brute forcing RDP port 3389
2020-06-01 12:47:36
87.246.7.74 attack
Jun  1 06:29:47 srv01 postfix/smtpd\[32186\]: warning: unknown\[87.246.7.74\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  1 06:29:58 srv01 postfix/smtpd\[32187\]: warning: unknown\[87.246.7.74\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  1 06:29:58 srv01 postfix/smtpd\[30247\]: warning: unknown\[87.246.7.74\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  1 06:29:59 srv01 postfix/smtpd\[27892\]: warning: unknown\[87.246.7.74\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  1 06:30:31 srv01 postfix/smtpd\[32186\]: warning: unknown\[87.246.7.74\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-01 12:41:05

Recently Reported IPs

191.191.214.254 248.40.38.2 48.224.168.153 168.128.10.242
213.155.165.8 59.45.194.131 18.30.75.81 121.59.231.109
104.157.210.171 97.229.181.114 22.24.244.68 126.209.171.157
243.3.142.135 31.136.44.73 226.40.48.45 188.157.33.57
19.102.87.99 254.166.57.149 173.54.245.168 82.87.10.86