Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Republic of China (ROC)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.158.130.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62382
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.158.130.145.			IN	A

;; AUTHORITY SECTION:
.			13	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 01:03:18 CST 2022
;; MSG SIZE  rcvd: 107
Host info
145.130.158.49.in-addr.arpa domain name pointer 49-158-130-145.dynamic.elinx.com.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.130.158.49.in-addr.arpa	name = 49-158-130-145.dynamic.elinx.com.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.174 attack
Jul 27 16:13:20 vps639187 sshd\[19619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Jul 27 16:13:22 vps639187 sshd\[19619\]: Failed password for root from 112.85.42.174 port 34414 ssh2
Jul 27 16:13:25 vps639187 sshd\[19619\]: Failed password for root from 112.85.42.174 port 34414 ssh2
...
2020-07-27 22:19:35
159.180.227.2 attack
2020-07-27T14:19:43.346709vps-d63064a2 sshd[78022]: Invalid user lcm from 159.180.227.2 port 40934
2020-07-27T14:19:43.353837vps-d63064a2 sshd[78022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.180.227.2
2020-07-27T14:19:43.346709vps-d63064a2 sshd[78022]: Invalid user lcm from 159.180.227.2 port 40934
2020-07-27T14:19:45.206021vps-d63064a2 sshd[78022]: Failed password for invalid user lcm from 159.180.227.2 port 40934 ssh2
...
2020-07-27 22:23:07
138.68.226.175 attackbotsspam
2020-07-27T15:54:46.471592n23.at sshd[997057]: Invalid user yangyi from 138.68.226.175 port 39192
2020-07-27T15:54:48.151642n23.at sshd[997057]: Failed password for invalid user yangyi from 138.68.226.175 port 39192 ssh2
2020-07-27T15:56:27.341925n23.at sshd[998570]: Invalid user koike from 138.68.226.175 port 35512
...
2020-07-27 22:39:19
89.216.99.163 attackbotsspam
2020-07-27 11:30:01,756 fail2ban.actions        [937]: NOTICE  [sshd] Ban 89.216.99.163
2020-07-27 12:05:59,342 fail2ban.actions        [937]: NOTICE  [sshd] Ban 89.216.99.163
2020-07-27 12:41:56,191 fail2ban.actions        [937]: NOTICE  [sshd] Ban 89.216.99.163
2020-07-27 13:18:03,846 fail2ban.actions        [937]: NOTICE  [sshd] Ban 89.216.99.163
2020-07-27 13:55:13,636 fail2ban.actions        [937]: NOTICE  [sshd] Ban 89.216.99.163
...
2020-07-27 22:13:42
94.130.16.67 attackbotsspam
Phishing, Spam
2020-07-27 22:33:36
5.180.220.106 attackbotsspam
[2020-07-27 10:14:16] NOTICE[1248][C-00000e5e] chan_sip.c: Call from '' (5.180.220.106:50886) to extension '9998979695011972595725668' rejected because extension not found in context 'public'.
[2020-07-27 10:14:16] SECURITY[1275] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-07-27T10:14:16.344-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9998979695011972595725668",SessionID="0x7f27200510e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/5.180.220.106/50886",ACLName="no_extension_match"
[2020-07-27 10:19:34] NOTICE[1248][C-00000e5f] chan_sip.c: Call from '' (5.180.220.106:53124) to extension '888555011972595725668' rejected because extension not found in context 'public'.
[2020-07-27 10:19:34] SECURITY[1275] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-07-27T10:19:34.097-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="888555011972595725668",SessionID="0x7f272006f888",LocalAddress="IPV4/UDP/192.168.244.
...
2020-07-27 22:43:52
188.166.172.189 attackbotsspam
2020-07-27T13:55:26+0200 Failed SSH Authentication/Brute Force Attack. (Server 10)
2020-07-27 22:04:34
183.101.142.213 attackbotsspam
Jul 27 14:11:34 master sshd[5325]: Failed password for invalid user nagios from 183.101.142.213 port 59475 ssh2
2020-07-27 22:16:57
159.203.63.125 attack
Jul 27 14:26:24 OPSO sshd\[24145\]: Invalid user deploy from 159.203.63.125 port 40779
Jul 27 14:26:24 OPSO sshd\[24145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.63.125
Jul 27 14:26:27 OPSO sshd\[24145\]: Failed password for invalid user deploy from 159.203.63.125 port 40779 ssh2
Jul 27 14:30:55 OPSO sshd\[24673\]: Invalid user mule from 159.203.63.125 port 47795
Jul 27 14:30:55 OPSO sshd\[24673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.63.125
2020-07-27 22:08:01
131.117.150.106 attack
2020-07-27T09:53:09.117232sorsha.thespaminator.com sshd[11890]: Invalid user jhpark from 131.117.150.106 port 46438
2020-07-27T09:53:12.308281sorsha.thespaminator.com sshd[11890]: Failed password for invalid user jhpark from 131.117.150.106 port 46438 ssh2
...
2020-07-27 22:24:04
219.73.109.6 attackbotsspam
Jul 27 14:09:03 master sshd[5230]: Failed password for invalid user admin from 219.73.109.6 port 32986 ssh2
2020-07-27 22:29:19
222.73.215.81 attackspam
2020-07-27T15:24:20.469446mail.standpoint.com.ua sshd[16972]: Invalid user cbs from 222.73.215.81 port 46680
2020-07-27T15:24:20.472141mail.standpoint.com.ua sshd[16972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.73.215.81
2020-07-27T15:24:20.469446mail.standpoint.com.ua sshd[16972]: Invalid user cbs from 222.73.215.81 port 46680
2020-07-27T15:24:22.249425mail.standpoint.com.ua sshd[16972]: Failed password for invalid user cbs from 222.73.215.81 port 46680 ssh2
2020-07-27T15:26:36.682596mail.standpoint.com.ua sshd[17267]: Invalid user appletv from 222.73.215.81 port 57130
...
2020-07-27 22:11:32
200.6.188.38 attackbots
Jul 27 07:07:37 s158375 sshd[3158]: Failed password for invalid user amavis from 200.6.188.38 port 36546 ssh2
2020-07-27 22:28:18
123.114.208.126 attackspambots
Invalid user loki from 123.114.208.126 port 38087
2020-07-27 22:28:56
139.59.69.76 attack
$f2bV_matches
2020-07-27 22:41:17

Recently Reported IPs

54.153.37.246 37.10.95.200 218.3.40.18 45.83.64.93
120.195.30.152 186.189.208.202 36.82.20.95 124.120.128.60
95.45.254.204 193.202.80.68 38.77.42.211 78.186.47.5
5.181.169.49 188.162.252.143 62.1.59.185 139.196.193.175
113.120.25.9 191.55.177.101 110.169.221.191 54.244.17.214