Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.49.26.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48804
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;211.49.26.159.			IN	A

;; AUTHORITY SECTION:
.			403	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121101 1800 900 604800 86400

;; Query time: 107 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 12 03:49:18 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 159.26.49.211.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		100.100.2.136
Address:	100.100.2.136#53

** server can't find 159.26.49.211.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
162.248.54.39 attackbots
Nov 13 04:58:42 *** sshd[25369]: Invalid user bnjoroge from 162.248.54.39
2019-11-13 13:34:38
94.176.17.27 attackbotsspam
(Nov 13)  LEN=60 TTL=116 ID=26149 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 13)  LEN=60 TTL=114 ID=13322 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 13)  LEN=60 TTL=114 ID=1622 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 12)  LEN=60 TTL=114 ID=1232 DF TCP DPT=1433 WINDOW=8192 SYN 
 (Nov 12)  LEN=60 TTL=116 ID=1555 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 12)  LEN=60 TTL=116 ID=4515 DF TCP DPT=1433 WINDOW=8192 SYN 
 (Nov 12)  LEN=60 TTL=114 ID=12754 DF TCP DPT=1433 WINDOW=8192 SYN 
 (Nov 12)  LEN=60 TTL=116 ID=16085 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 11)  LEN=60 TTL=115 ID=25282 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 11)  LEN=60 TTL=115 ID=20399 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 11)  LEN=60 TTL=113 ID=24666 DF TCP DPT=1433 WINDOW=8192 SYN
2019-11-13 13:35:27
5.253.204.29 attack
(From rodgerhoorp@outlook.com) Buy very rare high ahrefs SEO metrics score backlinks. Manual backlinks placed on quality websites which have high UR and DR ahrefs score. Order today while we can offer this service, Limited time offer. 
 
more info: 
https://www.monkeydigital.co/product/high-ahrefs-backlinks/ 
 
thanks 
Monkey Digital Team 
 
200 high aHrefs UR DR backlinks – Monkey Digital 
https://www.monkeydigital.co
2019-11-13 13:37:50
50.127.71.5 attack
$f2bV_matches
2019-11-13 13:51:55
123.125.71.115 attack
Automatic report - Banned IP Access
2019-11-13 13:29:20
222.233.53.132 attack
Nov 13 00:34:13 TORMINT sshd\[15173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.233.53.132  user=root
Nov 13 00:34:16 TORMINT sshd\[15173\]: Failed password for root from 222.233.53.132 port 52800 ssh2
Nov 13 00:38:09 TORMINT sshd\[15431\]: Invalid user home from 222.233.53.132
Nov 13 00:38:09 TORMINT sshd\[15431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.233.53.132
...
2019-11-13 13:41:34
180.76.238.70 attack
$f2bV_matches
2019-11-13 13:24:10
223.171.32.56 attackbotsspam
Nov 12 19:10:57 wbs sshd\[25663\]: Invalid user server from 223.171.32.56
Nov 12 19:10:57 wbs sshd\[25663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.32.56
Nov 12 19:10:59 wbs sshd\[25663\]: Failed password for invalid user server from 223.171.32.56 port 23893 ssh2
Nov 12 19:14:55 wbs sshd\[25990\]: Invalid user merical from 223.171.32.56
Nov 12 19:14:55 wbs sshd\[25990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.32.56
2019-11-13 13:33:04
94.158.41.164 attackspambots
Automatic report - Port Scan Attack
2019-11-13 13:47:46
168.61.176.121 attack
2019-11-13T04:58:53.949034abusebot-5.cloudsearch.cf sshd\[22019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.61.176.121  user=root
2019-11-13 13:27:32
45.144.3.155 attackbots
Nov 13 06:23:04 kmh-mb-001 sshd[7340]: Bad protocol version identification '' from 45.144.3.155 port 35270
Nov 13 06:23:19 kmh-mb-001 sshd[7341]: Did not receive identification string from 45.144.3.155 port 35622
Nov 13 06:23:20 kmh-mb-001 sshd[7342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.144.3.155  user=r.r
Nov 13 06:23:21 kmh-mb-001 sshd[7342]: Failed password for r.r from 45.144.3.155 port 35624 ssh2
Nov 13 06:23:21 kmh-mb-001 sshd[7342]: Connection closed by 45.144.3.155 port 35624 [preauth]
Nov 13 06:23:21 kmh-mb-001 sshd[7344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.144.3.155  user=r.r
Nov 13 06:23:21 kmh-mb-001 sshd[7345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.144.3.155  user=r.r
Nov 13 06:23:21 kmh-mb-001 sshd[7346]: Connection closed by 45.144.3.155 port 35758 [preauth]
Nov 13 06:23:23 kmh-mb-001 sshd[73........
-------------------------------
2019-11-13 13:38:35
51.68.124.181 attack
Nov 13 10:54:27 areeb-Workstation sshd[19549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.124.181
Nov 13 10:54:29 areeb-Workstation sshd[19549]: Failed password for invalid user quraisha from 51.68.124.181 port 57374 ssh2
...
2019-11-13 13:44:23
128.199.100.225 attackspambots
2019-11-13T05:35:43.767192abusebot-6.cloudsearch.cf sshd\[25681\]: Invalid user cristian from 128.199.100.225 port 50056
2019-11-13 13:50:32
222.186.173.215 attackbots
2019-11-13T06:06:07.1903631240 sshd\[2916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
2019-11-13T06:06:09.0925411240 sshd\[2916\]: Failed password for root from 222.186.173.215 port 33594 ssh2
2019-11-13T06:06:11.9799081240 sshd\[2916\]: Failed password for root from 222.186.173.215 port 33594 ssh2
...
2019-11-13 13:17:33
210.212.145.125 attackbots
SSH bruteforce (Triggered fail2ban)
2019-11-13 13:20:54

Recently Reported IPs

175.152.111.24 159.138.188.51 230.127.8.88 59.12.15.30
168.60.135.232 88.77.4.187 150.255.86.54 181.176.200.9
102.2.27.159 148.100.73.213 150.255.6.220 54.39.44.49
31.210.142.130 176.77.192.100 220.165.10.105 119.152.11.125
30.83.253.156 102.121.25.195 26.211.195.174 124.235.138.72