Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hesse

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
162.158.94.198 attackspam
srv02 DDoS Malware Target(80:http) ..
2020-10-10 02:27:15
162.158.94.198 attackbotsspam
srv02 DDoS Malware Target(80:http) ..
2020-10-09 18:12:31
162.158.94.142 attackspambots
srv02 DDoS Malware Target(80:http) ..
2020-10-05 05:03:15
162.158.94.142 attackbotsspam
srv02 DDoS Malware Target(80:http) ..
2020-10-04 20:57:38
162.158.94.142 attackbots
srv02 DDoS Malware Target(80:http) ..
2020-10-04 12:40:51
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.158.94.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63682
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;162.158.94.49.			IN	A

;; AUTHORITY SECTION:
.			439	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110501 1800 900 604800 86400

;; Query time: 116 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 06 13:38:51 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 49.94.158.162.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 49.94.158.162.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
159.65.81.187 attackspambots
Invalid user postgres from 159.65.81.187 port 43790
2019-10-26 13:02:27
185.220.101.48 attackbots
detected by Fail2Ban
2019-10-26 12:47:46
120.52.96.216 attackbotsspam
2019-10-26T04:24:39.662900abusebot-5.cloudsearch.cf sshd\[12683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.96.216  user=root
2019-10-26 12:46:29
81.22.45.116 attack
2019-10-26T07:09:42.232417+02:00 lumpi kernel: [1888979.581655] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.116 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=12926 PROTO=TCP SPT=56953 DPT=26140 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-26 13:13:28
77.247.110.216 attackspam
10/26/2019-05:52:43.376978 77.247.110.216 Protocol: 17 ET CINS Active Threat Intelligence Poor Reputation IP group 75
2019-10-26 13:19:29
142.4.203.130 attack
Oct 26 07:16:56 srv206 sshd[2920]: Invalid user jboss from 142.4.203.130
Oct 26 07:16:56 srv206 sshd[2920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.ip-142-4-203.net
Oct 26 07:16:56 srv206 sshd[2920]: Invalid user jboss from 142.4.203.130
Oct 26 07:16:58 srv206 sshd[2920]: Failed password for invalid user jboss from 142.4.203.130 port 47088 ssh2
...
2019-10-26 13:22:22
121.137.77.82 attackbotsspam
2019-10-25T22:11:49.466409suse-nuc sshd[4846]: error: maximum authentication attempts exceeded for root from 121.137.77.82 port 42303 ssh2 [preauth]
...
2019-10-26 13:12:39
41.221.168.167 attackbotsspam
Oct 26 05:53:50 lnxweb62 sshd[32500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.221.168.167
2019-10-26 12:41:30
59.9.31.195 attackbotsspam
Oct 26 06:29:46 mail sshd[8124]: Failed password for root from 59.9.31.195 port 49378 ssh2
Oct 26 06:36:44 mail sshd[9066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.9.31.195 
Oct 26 06:36:46 mail sshd[9066]: Failed password for invalid user test1 from 59.9.31.195 port 40793 ssh2
2019-10-26 12:51:10
1.52.238.150 attackspambots
SMB Server BruteForce Attack
2019-10-26 13:10:00
61.172.238.14 attackspambots
Oct 26 04:31:50 localhost sshd\[68858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.172.238.14  user=root
Oct 26 04:31:53 localhost sshd\[68858\]: Failed password for root from 61.172.238.14 port 39694 ssh2
Oct 26 04:36:54 localhost sshd\[69008\]: Invalid user ftpuser from 61.172.238.14 port 46824
Oct 26 04:36:54 localhost sshd\[69008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.172.238.14
Oct 26 04:36:56 localhost sshd\[69008\]: Failed password for invalid user ftpuser from 61.172.238.14 port 46824 ssh2
...
2019-10-26 12:49:45
37.59.60.115 attack
Automatic report - Banned IP Access
2019-10-26 12:42:24
159.203.44.244 attack
/wp-login.php
2019-10-26 13:18:46
52.231.153.23 attackspam
Invalid user jboss from 52.231.153.23 port 37872
2019-10-26 13:10:50
189.213.166.124 attackspam
Automatic report - Port Scan Attack
2019-10-26 13:05:49

Recently Reported IPs

114.241.44.66 81.28.107.18 46.182.6.242 180.242.223.62
192.115.165.99 220.143.24.174 176.102.6.35 193.23.160.14
35.237.108.17 119.76.128.49 125.27.127.221 62.234.101.102
188.172.219.138 36.78.203.92 222.107.241.119 223.30.148.138
54.37.84.67 14.172.118.26 182.53.70.149 82.165.138.167