Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.164.71.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11599
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.164.71.10.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022600 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 20:00:28 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 10.71.164.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 10.71.164.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
63.240.240.74 attackspam
(sshd) Failed SSH login from 63.240.240.74 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 10 09:34:17 server2 sshd[1499]: Invalid user adam from 63.240.240.74
Oct 10 09:34:17 server2 sshd[1499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.240.240.74 
Oct 10 09:34:19 server2 sshd[1499]: Failed password for invalid user adam from 63.240.240.74 port 39363 ssh2
Oct 10 09:51:28 server2 sshd[10610]: Invalid user kimberly from 63.240.240.74
Oct 10 09:51:28 server2 sshd[10610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.240.240.74
2020-10-10 22:02:00
111.229.121.142 attack
Oct 10 14:46:00 v22019038103785759 sshd\[14331\]: Invalid user mastermaster from 111.229.121.142 port 57008
Oct 10 14:46:00 v22019038103785759 sshd\[14331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.121.142
Oct 10 14:46:02 v22019038103785759 sshd\[14331\]: Failed password for invalid user mastermaster from 111.229.121.142 port 57008 ssh2
Oct 10 14:50:29 v22019038103785759 sshd\[14752\]: Invalid user nagios from 111.229.121.142 port 42722
Oct 10 14:50:29 v22019038103785759 sshd\[14752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.121.142
...
2020-10-10 22:33:40
45.148.122.173 attack
Found on   Github Combined on 5 lists    / proto=6  .  srcport=38085  .  dstport=22 SSH  .     (1783)
2020-10-10 22:13:00
165.232.76.218 attackbots
Oct 10 09:28:38 dignus sshd[12247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.76.218
Oct 10 09:28:40 dignus sshd[12247]: Failed password for invalid user informix from 165.232.76.218 port 33776 ssh2
Oct 10 09:34:16 dignus sshd[12410]: Invalid user test2001 from 165.232.76.218 port 38906
Oct 10 09:34:16 dignus sshd[12410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.76.218
Oct 10 09:34:18 dignus sshd[12410]: Failed password for invalid user test2001 from 165.232.76.218 port 38906 ssh2
...
2020-10-10 22:35:03
142.93.241.19 attack
2020-10-10T06:56:52.344225kitsunetech sshd[15347]: Invalid user guest1 from 142.93.241.19 port 46578
2020-10-10 22:30:49
89.33.192.23 attackspambots
Sep 20 04:32:51 *hidden* postfix/postscreen[42372]: DNSBL rank 3 for [89.33.192.23]:38112
2020-10-10 22:37:56
222.186.42.137 attack
Oct 10 16:17:24 piServer sshd[16781]: Failed password for root from 222.186.42.137 port 36114 ssh2
Oct 10 16:17:28 piServer sshd[16781]: Failed password for root from 222.186.42.137 port 36114 ssh2
Oct 10 16:17:32 piServer sshd[16781]: Failed password for root from 222.186.42.137 port 36114 ssh2
...
2020-10-10 22:21:13
89.33.192.58 attackspambots
Unauthorized connection attempt detected from IP address 89.33.192.58 to port 25 [T]
2020-10-10 22:32:22
40.121.163.198 attack
Fail2Ban Ban Triggered
2020-10-10 22:07:45
94.102.54.221 attack
Sep 11 22:18:34 *hidden* postfix/postscreen[38933]: DNSBL rank 4 for [94.102.54.221]:49264
2020-10-10 22:22:21
194.5.177.67 attackspambots
Lines containing failures of 194.5.177.67
Oct  7 20:37:48 nodeA4 sshd[17651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.5.177.67  user=r.r
Oct  7 20:37:50 nodeA4 sshd[17651]: Failed password for r.r from 194.5.177.67 port 47458 ssh2
Oct  7 20:37:50 nodeA4 sshd[17651]: Received disconnect from 194.5.177.67 port 47458:11: Bye Bye [preauth]
Oct  7 20:37:50 nodeA4 sshd[17651]: Disconnected from authenticating user r.r 194.5.177.67 port 47458 [preauth]
Oct  7 20:46:00 nodeA4 sshd[18539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.5.177.67  user=r.r
Oct  7 20:46:02 nodeA4 sshd[18539]: Failed password for r.r from 194.5.177.67 port 59788 ssh2
Oct  7 20:46:02 nodeA4 sshd[18539]: Received disconnect from 194.5.177.67 port 59788:11: Bye Bye [preauth]
Oct  7 20:46:02 nodeA4 sshd[18539]: Disconnected from authenticating user r.r 194.5.177.67 port 59788 [preauth]
Oct  7 20:50:47 nodeA4 ........
------------------------------
2020-10-10 22:28:14
112.85.42.230 attackspam
Oct 10 16:18:49 eventyay sshd[17777]: Failed password for root from 112.85.42.230 port 9236 ssh2
Oct 10 16:18:59 eventyay sshd[17777]: Failed password for root from 112.85.42.230 port 9236 ssh2
Oct 10 16:19:01 eventyay sshd[17777]: Failed password for root from 112.85.42.230 port 9236 ssh2
Oct 10 16:19:01 eventyay sshd[17777]: error: maximum authentication attempts exceeded for root from 112.85.42.230 port 9236 ssh2 [preauth]
...
2020-10-10 22:23:43
201.193.198.70 attack
445/tcp 445/tcp
[2020-08-30/10-10]2pkt
2020-10-10 22:14:16
195.95.215.157 attackbotsspam
"Unauthorized connection attempt on SSHD detected"
2020-10-10 22:21:43
46.36.27.120 attack
$f2bV_matches
2020-10-10 22:26:36

Recently Reported IPs

30.42.242.118 106.32.191.152 61.109.198.142 58.65.55.38
163.205.148.48 35.37.153.224 66.41.89.159 230.12.31.27
38.50.236.109 38.238.171.13 179.231.14.102 43.126.16.13
69.148.225.196 57.134.121.145 144.165.43.7 130.4.72.104
235.52.191.55 173.203.217.6 62.46.171.179 204.67.130.231