Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.167.148.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60785
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.167.148.140.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 13:07:47 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 140.148.167.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.148.167.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.247.4.118 attack
Automatic report - Port Scan Attack
2019-12-29 07:09:53
82.146.48.235 attackbotsspam
Dec 28 23:37:43 grey postfix/smtpd\[12783\]: NOQUEUE: reject: RCPT from unknown\[82.146.48.235\]: 554 5.7.1 Service unavailable\; Client host \[82.146.48.235\] blocked using db.wpbl.info\; Spam source - http://wpbl.info/record\?ip=82.146.48.235\; from=\ to=\ proto=ESMTP helo=\
...
2019-12-29 07:09:35
49.235.114.248 attack
Lines containing failures of 49.235.114.248
Dec 26 09:32:20 nextcloud sshd[27584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.114.248  user=r.r
Dec 26 09:32:23 nextcloud sshd[27584]: Failed password for r.r from 49.235.114.248 port 2674 ssh2
Dec 26 09:32:23 nextcloud sshd[27584]: Received disconnect from 49.235.114.248 port 2674:11: Bye Bye [preauth]
Dec 26 09:32:23 nextcloud sshd[27584]: Disconnected from authenticating user r.r 49.235.114.248 port 2674 [preauth]
Dec 26 09:42:10 nextcloud sshd[30485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.114.248  user=r.r
Dec 26 09:42:12 nextcloud sshd[30485]: Failed password for r.r from 49.235.114.248 port 18396 ssh2
Dec 26 09:42:12 nextcloud sshd[30485]: Received disconnect from 49.235.114.248 port 18396:11: Bye Bye [preauth]
Dec 26 09:42:12 nextcloud sshd[30485]: Disconnected from authenticating user r.r 49.235.114.248 port ........
------------------------------
2019-12-29 07:05:51
45.82.153.142 attackbotsspam
Dec 28 23:46:20 relay postfix/smtpd\[9528\]: warning: unknown\[45.82.153.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 28 23:47:46 relay postfix/smtpd\[13002\]: warning: unknown\[45.82.153.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 28 23:48:06 relay postfix/smtpd\[9178\]: warning: unknown\[45.82.153.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 28 23:48:30 relay postfix/smtpd\[15815\]: warning: unknown\[45.82.153.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 28 23:48:52 relay postfix/smtpd\[12987\]: warning: unknown\[45.82.153.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-12-29 06:53:46
223.240.84.49 attackspambots
Dec 28 22:33:02 sshgateway sshd\[6312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.240.84.49  user=root
Dec 28 22:33:04 sshgateway sshd\[6312\]: Failed password for root from 223.240.84.49 port 55182 ssh2
Dec 28 22:37:56 sshgateway sshd\[6348\]: Invalid user mailnull from 223.240.84.49
2019-12-29 06:58:40
176.185.218.124 attack
Lines containing failures of 176.185.218.124
Dec 23 12:39:03 shared01 sshd[19767]: Invalid user pi from 176.185.218.124 port 57200
Dec 23 12:39:03 shared01 sshd[19766]: Invalid user pi from 176.185.218.124 port 57194
Dec 23 12:39:03 shared01 sshd[19767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.185.218.124
Dec 23 12:39:03 shared01 sshd[19766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.185.218.124


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=176.185.218.124
2019-12-29 07:12:59
35.203.148.246 attackspambots
Dec 28 23:34:36 legacy sshd[25321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.203.148.246
Dec 28 23:34:38 legacy sshd[25321]: Failed password for invalid user natalie123 from 35.203.148.246 port 52736 ssh2
Dec 28 23:38:02 legacy sshd[25390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.203.148.246
...
2019-12-29 06:54:51
62.210.101.193 attack
$f2bV_matches
2019-12-29 06:50:53
2.93.22.164 attack
1577572670 - 12/28/2019 23:37:50 Host: 2.93.22.164/2.93.22.164 Port: 445 TCP Blocked
2019-12-29 07:03:27
45.225.192.148 attackbots
Automatic report - Port Scan Attack
2019-12-29 07:22:46
1.53.116.251 attack
19/12/28@17:37:44: FAIL: Alarm-Telnet address from=1.53.116.251
...
2019-12-29 07:08:00
49.88.112.115 attackbotsspam
Dec 28 23:59:28 localhost sshd\[6005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115  user=root
Dec 28 23:59:30 localhost sshd\[6005\]: Failed password for root from 49.88.112.115 port 56974 ssh2
Dec 28 23:59:32 localhost sshd\[6005\]: Failed password for root from 49.88.112.115 port 56974 ssh2
2019-12-29 07:10:52
58.247.84.198 attack
Invalid user forge from 58.247.84.198 port 42240
2019-12-29 07:12:22
223.149.252.195 attack
Automatic report - Port Scan Attack
2019-12-29 07:01:13
1.52.154.90 attackbots
port 23
2019-12-29 07:00:58

Recently Reported IPs

59.30.151.88 38.152.209.155 23.171.163.226 43.224.95.92
234.148.174.250 97.214.3.179 200.173.210.24 248.223.7.114
13.184.184.164 83.162.38.76 67.21.249.75 109.123.47.145
198.159.101.17 247.41.186.89 231.232.170.182 117.27.226.27
81.84.221.170 145.32.217.244 59.79.144.236 17.215.89.71