Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Republic of China (ROC)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
49.158.137.139 attackspam
Unauthorized connection attempt from IP address 49.158.137.139 on Port 445(SMB)
2020-06-09 02:50:59
49.158.1.165 attackspam
Unauthorized connection attempt detected from IP address 49.158.1.165 to port 82 [T]
2020-05-20 10:30:59
49.158.186.203 attackbotsspam
 TCP (SYN) 49.158.186.203:26406 -> port 23, len 40
2020-05-20 05:28:18
49.158.138.86 attack
Unauthorized connection attempt detected from IP address 49.158.138.86 to port 445 [T]
2020-04-15 02:19:37
49.158.159.146 attackspam
Unauthorized connection attempt from IP address 49.158.159.146 on Port 445(SMB)
2020-03-22 23:51:43
49.158.123.16 attack
Honeypot attack, port: 81, PTR: 49-158-123-16.dynamic.elinx.com.tw.
2020-02-10 17:25:12
49.158.139.164 attackbotsspam
Unauthorized connection attempt detected from IP address 49.158.139.164 to port 5555 [J]
2020-01-29 09:28:55
49.158.169.30 attackbotsspam
Aug 29 23:15:48 localhost sshd\[18866\]: Invalid user all from 49.158.169.30 port 45552
Aug 29 23:15:48 localhost sshd\[18866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.158.169.30
Aug 29 23:15:50 localhost sshd\[18866\]: Failed password for invalid user all from 49.158.169.30 port 45552 ssh2
2019-08-30 05:17:03
49.158.169.30 attackbots
Aug 29 14:32:58 localhost sshd\[25802\]: Invalid user fdl from 49.158.169.30 port 56842
Aug 29 14:32:58 localhost sshd\[25802\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.158.169.30
Aug 29 14:33:00 localhost sshd\[25802\]: Failed password for invalid user fdl from 49.158.169.30 port 56842 ssh2
2019-08-29 20:43:54
49.158.112.109 attackbots
445/tcp
[2019-08-02]1pkt
2019-08-03 11:50:04
49.158.128.120 attack
5555/tcp
[2019-06-30]1pkt
2019-06-30 13:55:49
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.158.1.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21795
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.158.1.249.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 23:48:21 CST 2022
;; MSG SIZE  rcvd: 105
Host info
249.1.158.49.in-addr.arpa domain name pointer 49-158-1-249.dynamic.elinx.com.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
249.1.158.49.in-addr.arpa	name = 49-158-1-249.dynamic.elinx.com.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
209.97.162.146 attackbotsspam
Aug 14 06:33:40 MK-Soft-Root2 sshd\[1020\]: Invalid user chsm from 209.97.162.146 port 46528
Aug 14 06:33:40 MK-Soft-Root2 sshd\[1020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.162.146
Aug 14 06:33:41 MK-Soft-Root2 sshd\[1020\]: Failed password for invalid user chsm from 209.97.162.146 port 46528 ssh2
...
2019-08-14 13:47:24
132.255.29.228 attackspam
Invalid user lin from 132.255.29.228 port 39574
2019-08-14 14:16:08
125.161.105.198 attackbotsspam
Unauthorized connection attempt from IP address 125.161.105.198 on Port 445(SMB)
2019-08-14 13:19:42
69.162.68.54 attackspam
Aug 14 07:31:20 vps691689 sshd[14159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.162.68.54
Aug 14 07:31:22 vps691689 sshd[14159]: Failed password for invalid user sgt from 69.162.68.54 port 41574 ssh2
...
2019-08-14 13:48:26
34.73.39.215 attackbots
Aug 14 06:19:24 XXX sshd[45002]: Invalid user alex from 34.73.39.215 port 40922
2019-08-14 13:51:12
84.87.154.124 attackbots
Automatic report - Port Scan Attack
2019-08-14 14:04:38
124.227.196.119 attack
Aug 14 07:54:40 vps691689 sshd[14653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.227.196.119
Aug 14 07:54:41 vps691689 sshd[14653]: Failed password for invalid user mprint from 124.227.196.119 port 42378 ssh2
...
2019-08-14 14:03:03
85.50.202.61 attackbots
Aug 14 04:26:21 XXX sshd[41704]: Invalid user backend from 85.50.202.61 port 40848
2019-08-14 13:57:55
113.162.29.142 attackbots
Unauthorized connection attempt from IP address 113.162.29.142 on Port 445(SMB)
2019-08-14 14:06:50
212.109.217.198 attack
ZTE Router Exploit Scanner
2019-08-14 14:13:56
49.83.244.88 attackbotsspam
Automatic report - Port Scan Attack
2019-08-14 14:18:20
182.52.90.164 attackspam
Aug 14 04:22:25 XXX sshd[41666]: Invalid user Nicole from 182.52.90.164 port 38144
2019-08-14 14:08:34
14.177.239.123 attackbotsspam
Unauthorized connection attempt from IP address 14.177.239.123 on Port 445(SMB)
2019-08-14 14:04:05
177.103.232.152 attackspam
Unauthorized connection attempt from IP address 177.103.232.152 on Port 445(SMB)
2019-08-14 13:18:14
103.60.126.65 attack
Aug 14 07:03:29 v22018076622670303 sshd\[12257\]: Invalid user meng from 103.60.126.65 port 18635
Aug 14 07:03:29 v22018076622670303 sshd\[12257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.60.126.65
Aug 14 07:03:31 v22018076622670303 sshd\[12257\]: Failed password for invalid user meng from 103.60.126.65 port 18635 ssh2
...
2019-08-14 14:00:53

Recently Reported IPs

41.36.22.167 180.114.212.66 177.190.75.164 200.194.41.232
115.43.47.47 117.194.164.56 186.95.62.203 39.79.76.12
52.146.32.213 103.126.240.163 20.206.104.10 41.57.97.20
200.38.229.95 125.235.10.90 197.58.80.74 181.214.250.170
103.31.45.173 192.241.206.210 189.112.17.142 212.115.236.19