Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 172.162.2.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22891
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;172.162.2.49.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022300 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 01:20:47 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 49.2.162.172.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.2.162.172.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.59.66.230 attack
Mar 10 10:08:00 mail1 sshd[20270]: Invalid user influxdb from 139.59.66.230 port 40626
Mar 10 10:08:00 mail1 sshd[20270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.66.230
Mar 10 10:08:02 mail1 sshd[20270]: Failed password for invalid user influxdb from 139.59.66.230 port 40626 ssh2
Mar 10 10:08:02 mail1 sshd[20270]: Received disconnect from 139.59.66.230 port 40626:11: Bye Bye [preauth]
Mar 10 10:08:02 mail1 sshd[20270]: Disconnected from 139.59.66.230 port 40626 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=139.59.66.230
2020-03-10 22:21:13
171.224.181.220 attack
Port probing on unauthorized port 8291
2020-03-10 22:23:20
64.66.215.236 attackspambots
Automatic report - Port Scan Attack
2020-03-10 22:06:26
110.139.127.165 attackspam
20/3/10@09:04:00: FAIL: Alarm-Network address from=110.139.127.165
...
2020-03-10 22:45:13
87.118.76.192 attack
Website administration hacking try
2020-03-10 22:26:09
113.160.188.142 attack
firewall-block, port(s): 8291/tcp
2020-03-10 22:33:24
92.63.194.106 attackbots
Mar 10 15:33:12 meumeu sshd[18748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.106 
Mar 10 15:33:14 meumeu sshd[18748]: Failed password for invalid user user from 92.63.194.106 port 42773 ssh2
Mar 10 15:33:33 meumeu sshd[18890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.106 
...
2020-03-10 22:36:42
124.43.10.63 attack
Mar x@x
Mar x@x
Mar x@x
Mar x@x
Mar x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=124.43.10.63
2020-03-10 22:40:29
188.166.44.186 attack
Invalid user jeremiah from 188.166.44.186 port 49942
2020-03-10 22:42:34
116.100.254.130 attackbotsspam
Automatic report - Port Scan Attack
2020-03-10 22:13:27
138.68.5.186 attack
(sshd) Failed SSH login from 138.68.5.186 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 10 11:18:16 s1 sshd[10476]: Invalid user kidostore from 138.68.5.186 port 58770
Mar 10 11:18:17 s1 sshd[10476]: Failed password for invalid user kidostore from 138.68.5.186 port 58770 ssh2
Mar 10 11:42:56 s1 sshd[11349]: Invalid user postgres from 138.68.5.186 port 38542
Mar 10 11:42:59 s1 sshd[11349]: Failed password for invalid user postgres from 138.68.5.186 port 38542 ssh2
Mar 10 12:07:43 s1 sshd[12334]: Invalid user kidostore from 138.68.5.186 port 46492
2020-03-10 22:18:08
2.57.68.74 attackspam
Chat Spam
2020-03-10 22:34:50
92.63.194.104 attackbotsspam
Mar 10 15:33:08 meumeu sshd[18696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.104 
Mar 10 15:33:10 meumeu sshd[18696]: Failed password for invalid user admin from 92.63.194.104 port 43659 ssh2
Mar 10 15:33:25 meumeu sshd[18837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.104 
...
2020-03-10 22:52:41
180.253.208.43 attackspam
SSH bruteforce more then 50 syn to 22 port per 10 seconds.
2020-03-10 22:26:58
187.138.199.169 attackspambots
$f2bV_matches
2020-03-10 22:09:23

Recently Reported IPs

163.89.32.13 132.222.3.247 113.51.141.231 241.167.17.228
24.229.244.16 166.214.34.91 127.187.77.20 246.20.124.172
176.26.133.133 60.124.18.237 147.50.13.134 50.60.62.234
9.201.184.29 87.107.58.3 155.243.81.244 68.56.186.98
38.235.74.114 241.178.87.117 254.165.125.167 196.42.35.48