Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.161.49.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64619
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.161.49.52.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 04:53:52 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 52.49.161.2.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.49.161.2.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.191.163.43 attackbots
Mar  1 21:08:05 vps647732 sshd[15513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.191.163.43
Mar  1 21:08:07 vps647732 sshd[15513]: Failed password for invalid user bot from 190.191.163.43 port 43746 ssh2
...
2020-03-02 04:10:03
35.241.150.97 attackspambots
Unauthorized connection attempt detected from IP address 35.241.150.97 to port 22 [J]
2020-03-02 04:48:38
198.108.66.156 attackbotsspam
" "
2020-03-02 04:36:11
101.86.165.36 attackbotsspam
Mar  1 21:32:29 localhost sshd\[21546\]: Invalid user test from 101.86.165.36 port 42432
Mar  1 21:32:29 localhost sshd\[21546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.86.165.36
Mar  1 21:32:31 localhost sshd\[21546\]: Failed password for invalid user test from 101.86.165.36 port 42432 ssh2
2020-03-02 04:33:34
218.92.0.191 attackbotsspam
Mar  1 21:04:55 dcd-gentoo sshd[23840]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Mar  1 21:04:58 dcd-gentoo sshd[23840]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Mar  1 21:04:55 dcd-gentoo sshd[23840]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Mar  1 21:04:58 dcd-gentoo sshd[23840]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Mar  1 21:04:55 dcd-gentoo sshd[23840]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Mar  1 21:04:58 dcd-gentoo sshd[23840]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Mar  1 21:04:58 dcd-gentoo sshd[23840]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.191 port 41800 ssh2
...
2020-03-02 04:18:57
59.90.182.225 attackbotsspam
Mar  1 15:43:52 nextcloud sshd\[15461\]: Invalid user yangx from 59.90.182.225
Mar  1 15:43:52 nextcloud sshd\[15461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.90.182.225
Mar  1 15:43:54 nextcloud sshd\[15461\]: Failed password for invalid user yangx from 59.90.182.225 port 33154 ssh2
2020-03-02 04:48:24
46.27.140.1 attackspam
Mar  1 20:21:33 MK-Soft-VM7 sshd[10514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.27.140.1 
Mar  1 20:21:35 MK-Soft-VM7 sshd[10514]: Failed password for invalid user minecraft from 46.27.140.1 port 59808 ssh2
...
2020-03-02 04:44:27
185.243.50.13 attack
From CCTV User Interface Log
...::ffff:185.243.50.13 - - [01/Mar/2020:08:18:37 +0000] "GET / HTTP/1.1" 200 960
...
2020-03-02 04:18:41
51.178.52.185 attack
Mar  1 21:02:16 h2177944 sshd\[16247\]: Invalid user ocean from 51.178.52.185 port 59720
Mar  1 21:02:16 h2177944 sshd\[16247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.52.185
Mar  1 21:02:18 h2177944 sshd\[16247\]: Failed password for invalid user ocean from 51.178.52.185 port 59720 ssh2
Mar  1 21:10:42 h2177944 sshd\[16840\]: Invalid user student2 from 51.178.52.185 port 51788
...
2020-03-02 04:13:49
51.77.212.235 attackspambots
Mar  1 21:41:12 localhost sshd\[31744\]: Invalid user a from 51.77.212.235 port 36028
Mar  1 21:41:12 localhost sshd\[31744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.212.235
Mar  1 21:41:14 localhost sshd\[31744\]: Failed password for invalid user a from 51.77.212.235 port 36028 ssh2
2020-03-02 04:42:06
58.33.31.82 attack
2020-03-01T13:08:37.743209abusebot-3.cloudsearch.cf sshd[23224]: Invalid user sam from 58.33.31.82 port 59712
2020-03-01T13:08:37.752180abusebot-3.cloudsearch.cf sshd[23224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.33.31.82
2020-03-01T13:08:37.743209abusebot-3.cloudsearch.cf sshd[23224]: Invalid user sam from 58.33.31.82 port 59712
2020-03-01T13:08:39.776192abusebot-3.cloudsearch.cf sshd[23224]: Failed password for invalid user sam from 58.33.31.82 port 59712 ssh2
2020-03-01T13:17:55.934814abusebot-3.cloudsearch.cf sshd[23747]: Invalid user arthur from 58.33.31.82 port 41681
2020-03-01T13:17:55.943860abusebot-3.cloudsearch.cf sshd[23747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.33.31.82
2020-03-01T13:17:55.934814abusebot-3.cloudsearch.cf sshd[23747]: Invalid user arthur from 58.33.31.82 port 41681
2020-03-01T13:17:57.902996abusebot-3.cloudsearch.cf sshd[23747]: Failed password for inva
...
2020-03-02 04:41:27
122.51.149.126 attack
Mar  1 20:55:45 jane sshd[32618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.149.126 
Mar  1 20:55:47 jane sshd[32618]: Failed password for invalid user wry from 122.51.149.126 port 60292 ssh2
...
2020-03-02 04:29:22
125.212.203.113 attackspam
Mar  1 14:17:47 lnxded64 sshd[30811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.203.113
2020-03-02 04:43:40
199.19.225.212 attackbots
WordPress login Brute force / Web App Attack on client site.
2020-03-02 04:23:34
78.139.38.195 attackbotsspam
Unauthorized connection attempt detected from IP address 78.139.38.195 to port 81 [J]
2020-03-02 04:38:00

Recently Reported IPs

133.49.102.59 246.154.14.93 144.107.55.52 157.165.181.156
227.98.52.3 135.192.24.202 109.62.3.2 23.133.43.247
103.193.32.201 166.116.26.169 12.199.55.240 134.233.201.10
53.119.35.221 225.47.172.160 36.54.28.21 241.15.249.25
171.64.92.134 38.227.148.181 90.226.13.175 125.31.236.42