Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tokyo

Region: Tokyo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.106.156.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44677
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.106.156.138.			IN	A

;; AUTHORITY SECTION:
.			1650	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090402 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Sep 05 05:00:52 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 138.156.106.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 138.156.106.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.38.235.100 attack
May 21 10:37:38 pornomens sshd\[2923\]: Invalid user pippo from 51.38.235.100 port 45464
May 21 10:37:38 pornomens sshd\[2923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.235.100
May 21 10:37:40 pornomens sshd\[2923\]: Failed password for invalid user pippo from 51.38.235.100 port 45464 ssh2
...
2020-05-21 16:40:10
120.198.74.42 attackspam
05/20/2020-23:53:12.492536 120.198.74.42 Protocol: 1 GPL SCAN PING NMAP
2020-05-21 16:30:22
104.248.205.67 attack
2020-05-21T08:45:07.963148centos sshd[13255]: Invalid user bup from 104.248.205.67 port 41068
2020-05-21T08:45:09.557273centos sshd[13255]: Failed password for invalid user bup from 104.248.205.67 port 41068 ssh2
2020-05-21T08:51:38.941409centos sshd[13673]: Invalid user pqw from 104.248.205.67 port 47870
...
2020-05-21 16:32:46
222.186.175.167 attack
May 21 07:39:45 localhost sshd[26379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167  user=root
May 21 07:39:46 localhost sshd[26379]: Failed password for root from 222.186.175.167 port 21138 ssh2
May 21 07:39:50 localhost sshd[26379]: Failed password for root from 222.186.175.167 port 21138 ssh2
May 21 07:39:45 localhost sshd[26379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167  user=root
May 21 07:39:46 localhost sshd[26379]: Failed password for root from 222.186.175.167 port 21138 ssh2
May 21 07:39:50 localhost sshd[26379]: Failed password for root from 222.186.175.167 port 21138 ssh2
May 21 07:39:45 localhost sshd[26379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167  user=root
May 21 07:39:46 localhost sshd[26379]: Failed password for root from 222.186.175.167 port 21138 ssh2
May 21 07:39:50 localhost sshd[26
...
2020-05-21 16:16:41
49.235.29.226 attack
2020-05-21T07:21:11.768339abusebot-5.cloudsearch.cf sshd[14318]: Invalid user yxo from 49.235.29.226 port 54416
2020-05-21T07:21:11.774363abusebot-5.cloudsearch.cf sshd[14318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.29.226
2020-05-21T07:21:11.768339abusebot-5.cloudsearch.cf sshd[14318]: Invalid user yxo from 49.235.29.226 port 54416
2020-05-21T07:21:14.102593abusebot-5.cloudsearch.cf sshd[14318]: Failed password for invalid user yxo from 49.235.29.226 port 54416 ssh2
2020-05-21T07:30:30.870039abusebot-5.cloudsearch.cf sshd[14331]: Invalid user ppw from 49.235.29.226 port 36278
2020-05-21T07:30:30.876232abusebot-5.cloudsearch.cf sshd[14331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.29.226
2020-05-21T07:30:30.870039abusebot-5.cloudsearch.cf sshd[14331]: Invalid user ppw from 49.235.29.226 port 36278
2020-05-21T07:30:33.610980abusebot-5.cloudsearch.cf sshd[14331]: Failed password 
...
2020-05-21 16:30:55
124.202.158.24 attackspambots
" "
2020-05-21 16:37:32
222.186.30.57 attackbotsspam
May 21 10:13:54 MainVPS sshd[13556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.57  user=root
May 21 10:13:56 MainVPS sshd[13556]: Failed password for root from 222.186.30.57 port 36007 ssh2
May 21 10:14:44 MainVPS sshd[14185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.57  user=root
May 21 10:14:45 MainVPS sshd[14185]: Failed password for root from 222.186.30.57 port 32254 ssh2
May 21 10:14:51 MainVPS sshd[14296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.57  user=root
May 21 10:14:54 MainVPS sshd[14296]: Failed password for root from 222.186.30.57 port 63829 ssh2
...
2020-05-21 16:17:10
49.232.155.37 attackbots
Invalid user bianca from 49.232.155.37 port 42542
2020-05-21 16:48:06
201.163.56.82 attack
SSHD unauthorised connection attempt (b)
2020-05-21 16:38:29
185.175.93.24 attack
05/21/2020-03:28:43.890862 185.175.93.24 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-21 16:27:57
141.98.9.160 attackbotsspam
...
2020-05-21 16:28:54
78.166.58.186 attackspambots
May 21 05:53:14 debian64 sshd[6470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.166.58.186 
May 21 05:53:16 debian64 sshd[6470]: Failed password for invalid user admin from 78.166.58.186 port 46205 ssh2
...
2020-05-21 16:27:41
213.118.170.210 attack
May 20 07:57:12 xxxxxxx7446550 sshd[8206]: Invalid user rumbidzai from 213.118.170.210
May 20 07:57:15 xxxxxxx7446550 sshd[8206]: Failed password for invalid user rumbidzai from 213.118.170.210 port 45402 ssh2
May 20 07:57:15 xxxxxxx7446550 sshd[8207]: Received disconnect from 213.118.170.210: 11: Bye Bye
May 20 08:03:43 xxxxxxx7446550 sshd[11510]: Invalid user enh from 213.118.170.210
May 20 08:03:45 xxxxxxx7446550 sshd[11510]: Failed password for invalid user enh from 213.118.170.210 port 57618 ssh2
May 20 08:03:45 xxxxxxx7446550 sshd[11511]: Received disconnect from 213.118.170.210: 11: Bye Bye
May 20 08:07:41 xxxxxxx7446550 sshd[12328]: Invalid user cez from 213.118.170.210
May 20 08:07:43 xxxxxxx7446550 sshd[12328]: Failed password for invalid user cez from 213.118.170.210 port 40246 ssh2
May 20 08:07:43 xxxxxxx7446550 sshd[12329]: Received disconnect from 213.118.170.210: 11: Bye Bye


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=213.118.170.210
2020-05-21 16:09:15
180.66.207.67 attackspam
<6 unauthorized SSH connections
2020-05-21 16:37:07
182.23.104.231 attack
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-05-21 16:17:38

Recently Reported IPs

49.231.229.229 24.55.236.255 163.124.57.196 114.47.182.167
225.205.11.92 61.250.144.195 47.181.10.165 74.32.132.192
49.141.135.184 203.64.211.76 253.20.250.93 3.199.33.83
177.134.217.14 245.135.108.32 207.187.200.77 95.133.225.29
11.177.210.47 106.238.138.107 0.17.241.4 32.224.134.141