Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Perth

Region: Western Australia

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.192.42.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38817
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.192.42.130.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 22:01:15 CST 2025
;; MSG SIZE  rcvd: 106
Host info
130.42.192.49.in-addr.arpa domain name pointer n49-192-42-130.per2.wa.optusnet.com.au.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.42.192.49.in-addr.arpa	name = n49-192-42-130.per2.wa.optusnet.com.au.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.168.219.192 attack
14 - Undeliverable: Emails for p***r@r**c.com
2020-08-06 07:41:11
143.255.130.2 attackbots
$f2bV_matches
2020-08-06 07:41:57
139.162.122.110 attackbotsspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-06 07:37:49
76.72.12.19 attackbots
$f2bV_matches
2020-08-06 07:23:54
162.213.38.67 attack
(pop3d) Failed POP3 login from 162.213.38.67 (US/United States/host-67-38.213.162.cloudsigma.net): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Aug  6 01:07:25 ir1 dovecot[3110802]: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=162.213.38.67, lip=5.63.12.44, session=
2020-08-06 07:53:10
142.93.215.22 attackspambots
SSH Brute Force
2020-08-06 07:47:20
103.40.150.44 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-05T22:26:33Z and 2020-08-05T22:39:38Z
2020-08-06 07:27:30
172.98.86.186 attackbotsspam
14 - Undeliverable: Emails for postmaster@rivertec.com
2020-08-06 07:20:53
104.131.55.92 attack
Aug  6 01:14:41 PorscheCustomer sshd[1517]: Failed password for root from 104.131.55.92 port 54254 ssh2
Aug  6 01:18:40 PorscheCustomer sshd[1685]: Failed password for root from 104.131.55.92 port 45006 ssh2
...
2020-08-06 07:24:53
66.96.190.9 attack
Virus
2020-08-06 07:20:03
193.142.59.136 attackbotsspam
Brute forcing email accounts
2020-08-06 07:27:52
218.92.0.133 attack
Aug  6 01:34:14 vpn01 sshd[23096]: Failed password for root from 218.92.0.133 port 52190 ssh2
Aug  6 01:34:17 vpn01 sshd[23096]: Failed password for root from 218.92.0.133 port 52190 ssh2
...
2020-08-06 07:34:46
106.13.149.57 attackbots
Aug  5 22:34:36 buvik sshd[451]: Failed password for root from 106.13.149.57 port 48492 ssh2
Aug  5 22:38:29 buvik sshd[1069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.149.57  user=root
Aug  5 22:38:31 buvik sshd[1069]: Failed password for root from 106.13.149.57 port 48508 ssh2
...
2020-08-06 07:13:28
36.49.159.106 attack
Aug  5 23:40:03 server sshd[4406]: Failed password for root from 36.49.159.106 port 2288 ssh2
Aug  5 23:44:37 server sshd[11795]: Failed password for root from 36.49.159.106 port 2515 ssh2
Aug  5 23:49:10 server sshd[18458]: Failed password for root from 36.49.159.106 port 2196 ssh2
2020-08-06 07:30:39
190.134.57.159 attack
Automatic report - Port Scan Attack
2020-08-06 07:16:23

Recently Reported IPs

188.122.13.159 173.231.144.109 81.209.229.125 45.119.225.12
120.237.189.241 221.223.254.98 224.203.182.111 155.233.123.70
24.253.51.12 155.199.228.248 226.30.132.40 66.147.114.110
20.191.203.91 116.217.19.25 83.5.93.211 65.175.128.127
4.156.66.39 64.255.180.7 172.199.115.125 198.39.35.57