Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.159.160.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59690
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.159.160.49.			IN	A

;; AUTHORITY SECTION:
.			527	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022120801 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 09 10:43:59 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 49.160.159.2.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.160.159.2.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
217.64.42.229 attackbots
217.64.42.229 - - [02/Jul/2019:15:44:51 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
217.64.42.229 - - [02/Jul/2019:15:44:52 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
217.64.42.229 - - [02/Jul/2019:15:44:52 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
217.64.42.229 - - [02/Jul/2019:15:44:53 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
217.64.42.229 - - [02/Jul/2019:15:44:53 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
217.64.42.229 - - [02/Jul/2019:15:44:53 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-03 02:29:57
189.240.105.161 attackspambots
Dec 20 20:10:50 motanud sshd\[21088\]: Invalid user git from 189.240.105.161 port 38260
Dec 20 20:10:50 motanud sshd\[21088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.240.105.161
Dec 20 20:10:51 motanud sshd\[21088\]: Failed password for invalid user git from 189.240.105.161 port 38260 ssh2
2019-07-03 02:04:45
118.24.5.163 attackspam
Jul  2 15:46:21 vps691689 sshd[20773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.5.163
Jul  2 15:46:23 vps691689 sshd[20773]: Failed password for invalid user svk from 118.24.5.163 port 44654 ssh2
...
2019-07-03 02:04:12
37.238.131.154 attackspam
Trying to deliver email spam, but blocked by RBL
2019-07-03 02:40:32
97.74.237.173 attackspambots
Jul  2 11:42:37 wildwolf wplogin[9105]: 97.74.237.173 jobboardsecrets.com [2019-07-02 11:42:37+0000] "POST /wp-login.php HTTP/1.1" "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "xxxxxxr2" "support2015"
Jul  2 11:42:39 wildwolf wplogin[1227]: 97.74.237.173 jobboardsecrets.com [2019-07-02 11:42:39+0000] "POST /wp-login.php HTTP/1.1" "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "extreme-member-client-support" ""
Jul  2 12:06:30 wildwolf wplogin[31178]: 97.74.237.173 jobboardsecrets.com [2019-07-02 12:06:30+0000] "POST /wp-login.php HTTP/1.1" "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "xxxxxxr2" "support123!"
Jul  2 12:06:47 wildwolf wplogin[31178]: 97.74.237.173 jobboardsecrets.com [2019-07-02 12:06:47+0000] "POST /wp-login.php HTTP/1.1" "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "extreme-member-client-support" ""
Jul  2 ........
------------------------------
2019-07-03 02:18:35
183.61.128.188 attackbotsspam
Jul  2 20:26:43 MK-Soft-Root1 sshd\[21837\]: Invalid user miner from 183.61.128.188 port 47006
Jul  2 20:26:43 MK-Soft-Root1 sshd\[21837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.61.128.188
Jul  2 20:26:45 MK-Soft-Root1 sshd\[21837\]: Failed password for invalid user miner from 183.61.128.188 port 47006 ssh2
...
2019-07-03 02:36:45
92.119.160.125 attack
02.07.2019 18:46:59 Connection to port 3026 blocked by firewall
2019-07-03 02:48:07
189.213.210.35 attackbotsspam
Feb 23 12:28:02 motanud sshd\[27593\]: Invalid user webuser from 189.213.210.35 port 56894
Feb 23 12:28:02 motanud sshd\[27593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.213.210.35
Feb 23 12:28:03 motanud sshd\[27593\]: Failed password for invalid user webuser from 189.213.210.35 port 56894 ssh2
2019-07-03 02:31:47
165.22.101.1 attackspam
Jul  1 17:31:20 proxmox sshd[8528]: Invalid user admin from 165.22.101.1 port 39802
Jul  1 17:31:20 proxmox sshd[8528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.101.1
Jul  1 17:31:22 proxmox sshd[8528]: Failed password for invalid user admin from 165.22.101.1 port 39802 ssh2
Jul  1 17:31:22 proxmox sshd[8528]: Received disconnect from 165.22.101.1 port 39802:11: Normal Shutdown, Thank you for playing [preauth]
Jul  1 17:31:22 proxmox sshd[8528]: Disconnected from 165.22.101.1 port 39802 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=165.22.101.1
2019-07-03 02:38:22
189.238.31.14 attackbotsspam
Mar  4 01:02:13 motanud sshd\[20674\]: Invalid user sf from 189.238.31.14 port 45174
Mar  4 01:02:13 motanud sshd\[20674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.238.31.14
Mar  4 01:02:15 motanud sshd\[20674\]: Failed password for invalid user sf from 189.238.31.14 port 45174 ssh2
2019-07-03 02:08:10
81.130.138.156 attackspam
Jul  2 15:47:57 ns41 sshd[8578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.130.138.156
2019-07-03 02:09:48
92.46.223.98 attackspam
Jul  2 18:16:15 mail sshd\[18547\]: Invalid user mb from 92.46.223.98
Jul  2 18:16:15 mail sshd\[18547\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.223.98
Jul  2 18:16:18 mail sshd\[18547\]: Failed password for invalid user mb from 92.46.223.98 port 54660 ssh2
...
2019-07-03 02:15:53
1.23.61.74 attackbots
445/tcp 445/tcp
[2019-07-02]2pkt
2019-07-03 02:48:59
189.22.248.111 attack
Jan 15 23:42:52 motanud sshd\[6323\]: Invalid user taiga from 189.22.248.111 port 38372
Jan 15 23:42:52 motanud sshd\[6323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.22.248.111
Jan 15 23:42:54 motanud sshd\[6323\]: Failed password for invalid user taiga from 189.22.248.111 port 38372 ssh2
2019-07-03 02:29:22
176.9.219.100 attack
SQL Injection attack
2019-07-03 02:26:26

Recently Reported IPs

235.148.2.43 78.56.126.56 19.188.118.103 131.34.82.128
224.75.26.182 39.99.227.162 16.149.29.230 149.14.16.53
97.68.141.136 155.169.152.18 144.97.55.209 137.126.149.236
136.216.234.227 131.95.54.96 12.79.126.99 215.11.56.7
242.252.180.97 196.38.200.236 69.193.22.189 134.200.34.62