Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Malaysia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.125.138.26
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37171
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.125.138.26.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 13:02:09 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 26.138.125.49.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 49.125.138.26.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
177.74.79.142 attackbotsspam
Aug  9 02:07:23 h2177944 sshd\[27136\]: Failed password for root from 177.74.79.142 port 36820 ssh2
Aug  9 03:07:42 h2177944 sshd\[29632\]: Invalid user student from 177.74.79.142 port 15517
Aug  9 03:07:42 h2177944 sshd\[29632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.74.79.142
Aug  9 03:07:43 h2177944 sshd\[29632\]: Failed password for invalid user student from 177.74.79.142 port 15517 ssh2
...
2019-08-09 09:30:06
189.79.185.6 attack
port scan and connect, tcp 8080 (http-proxy)
2019-08-09 09:47:05
186.90.190.105 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 20:37:45,190 INFO [amun_request_handler] PortScan Detected on Port: 445 (186.90.190.105)
2019-08-09 09:48:05
190.0.159.69 attack
Aug  9 02:23:06 ArkNodeAT sshd\[14211\]: Invalid user milena from 190.0.159.69
Aug  9 02:23:06 ArkNodeAT sshd\[14211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.0.159.69
Aug  9 02:23:08 ArkNodeAT sshd\[14211\]: Failed password for invalid user milena from 190.0.159.69 port 55391 ssh2
2019-08-09 09:49:58
196.46.36.144 attackbots
2019-07-31T02:52:07.732487wiz-ks3 sshd[6677]: Invalid user react from 196.46.36.144 port 34946
2019-07-31T02:52:07.734472wiz-ks3 sshd[6677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.46.36.144
2019-07-31T02:52:07.732487wiz-ks3 sshd[6677]: Invalid user react from 196.46.36.144 port 34946
2019-07-31T02:52:09.852360wiz-ks3 sshd[6677]: Failed password for invalid user react from 196.46.36.144 port 34946 ssh2
2019-07-31T03:06:35.553859wiz-ks3 sshd[6737]: Invalid user ozrt from 196.46.36.144 port 33137
2019-07-31T03:06:35.555967wiz-ks3 sshd[6737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.46.36.144
2019-07-31T03:06:35.553859wiz-ks3 sshd[6737]: Invalid user ozrt from 196.46.36.144 port 33137
2019-07-31T03:06:37.502978wiz-ks3 sshd[6737]: Failed password for invalid user ozrt from 196.46.36.144 port 33137 ssh2
2019-07-31T03:20:58.952843wiz-ks3 sshd[6765]: Invalid user paula from 196.46.36.144 port 59547
2019-07-31T03:20
2019-08-09 09:54:44
83.118.197.36 attackbots
Aug  8 23:50:21 lnxweb61 sshd[975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.118.197.36
2019-08-09 09:37:29
217.13.56.254 attackbotsspam
Multiple failed RDP login attempts
2019-08-09 09:19:05
139.162.77.6 attackspambots
Port scan attempt detected by AWS-CCS, CTS, India
2019-08-09 09:33:38
122.180.246.91 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 21:46:43,168 INFO [shellcode_manager] (122.180.246.91) no match, writing hexdump (b065c59c60ff587a4cfd8be44d80f016 :1949475) - MS17010 (EternalBlue)
2019-08-09 09:31:12
223.111.139.211 attackspambots
fire
2019-08-09 09:34:03
5.196.226.217 attack
Aug  9 05:56:13 webhost01 sshd[31806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.226.217
Aug  9 05:56:16 webhost01 sshd[31806]: Failed password for invalid user test1 from 5.196.226.217 port 50750 ssh2
...
2019-08-09 09:17:33
107.170.249.6 attack
Aug  8 22:31:17 mail sshd\[11519\]: Failed password for invalid user nfsnobody from 107.170.249.6 port 38860 ssh2
Aug  8 22:50:42 mail sshd\[11834\]: Invalid user malcolm from 107.170.249.6 port 56355
Aug  8 22:50:42 mail sshd\[11834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.249.6
...
2019-08-09 09:19:53
167.71.66.53 attackspam
DATE:2019-08-08 23:50:39, IP:167.71.66.53, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-08-09 09:23:44
106.75.21.94 attackbots
Aug  8 21:06:29 web1 postfix/smtpd[19062]: warning: unknown[106.75.21.94]: SASL LOGIN authentication failed: authentication failure
...
2019-08-09 09:28:13
209.17.96.90 attackbotsspam
Port scan attempt detected by AWS-CCS, CTS, India
2019-08-09 09:33:22

Recently Reported IPs

24.226.157.224 246.244.121.176 80.244.178.100 35.89.38.206
246.16.17.71 107.217.45.117 91.113.28.172 108.251.185.242
107.201.103.241 140.64.102.7 150.73.54.114 208.215.102.132
171.186.152.73 186.154.104.93 251.188.122.252 226.214.108.190
92.55.106.240 144.7.101.96 198.103.189.81 96.162.167.126