Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: Reliance Jio Infocomm Limited

Hostname: unknown

Organization: unknown

Usage Type: Mobile ISP

Comments:
Type Details Datetime
attack
Unauthorized connection attempt from IP address 49.34.145.134 on Port 445(SMB)
2019-07-21 05:47:40
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.34.145.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9892
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.34.145.134.			IN	A

;; AUTHORITY SECTION:
.			2872	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072001 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 21 05:47:36 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 134.145.34.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 134.145.34.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
95.46.140.49 attackbots
CMS (WordPress or Joomla) login attempt.
2020-09-10 12:00:57
177.107.35.26 attackbotsspam
SSH-BruteForce
2020-09-10 12:22:44
167.114.185.237 attack
2020-09-09T19:26:02.309062shield sshd\[1394\]: Invalid user zxin20 from 167.114.185.237 port 35706
2020-09-09T19:26:02.318285shield sshd\[1394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=237.ip-167-114-185.net
2020-09-09T19:26:04.765131shield sshd\[1394\]: Failed password for invalid user zxin20 from 167.114.185.237 port 35706 ssh2
2020-09-09T19:28:31.474489shield sshd\[1674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=237.ip-167-114-185.net  user=root
2020-09-09T19:28:33.042034shield sshd\[1674\]: Failed password for root from 167.114.185.237 port 43666 ssh2
2020-09-10 08:48:16
120.92.164.193 attack
detected by Fail2Ban
2020-09-10 08:45:29
119.45.137.52 attackbots
Sep  9 18:41:05 rush sshd[12597]: Failed password for root from 119.45.137.52 port 38614 ssh2
Sep  9 18:46:02 rush sshd[12675]: Failed password for root from 119.45.137.52 port 32806 ssh2
...
2020-09-10 12:02:51
73.6.227.20 attack
Sep  9 18:59:24 nas sshd[28830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.6.227.20 
Sep  9 18:59:24 nas sshd[28831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.6.227.20 
Sep  9 18:59:26 nas sshd[28830]: Failed password for invalid user pi from 73.6.227.20 port 53448 ssh2
Sep  9 18:59:26 nas sshd[28831]: Failed password for invalid user pi from 73.6.227.20 port 53456 ssh2
...
2020-09-10 12:14:52
218.92.0.247 attack
2020-09-10T04:00:29.595926shield sshd\[383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.247  user=root
2020-09-10T04:00:31.533212shield sshd\[383\]: Failed password for root from 218.92.0.247 port 51826 ssh2
2020-09-10T04:00:34.468197shield sshd\[383\]: Failed password for root from 218.92.0.247 port 51826 ssh2
2020-09-10T04:00:37.482600shield sshd\[383\]: Failed password for root from 218.92.0.247 port 51826 ssh2
2020-09-10T04:00:40.569827shield sshd\[383\]: Failed password for root from 218.92.0.247 port 51826 ssh2
2020-09-10 12:03:15
51.75.123.107 attackbots
2020-09-09T22:41:16+0000 Failed SSH Authentication/Brute Force Attack. (Server 6)
2020-09-10 12:20:17
209.205.200.13 attackbotsspam
(sshd) Failed SSH login from 209.205.200.13 (US/United States/-): 10 in the last 3600 secs
2020-09-10 12:26:23
222.186.190.2 attackspambots
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-09-10 08:49:08
86.247.118.135 attackbots
Sep  9 18:32:03 propaganda sshd[8850]: Connection from 86.247.118.135 port 55754 on 10.0.0.161 port 22 rdomain ""
Sep  9 18:32:03 propaganda sshd[8850]: Connection closed by 86.247.118.135 port 55754 [preauth]
2020-09-10 12:27:29
78.190.139.168 attack
Brute Force
2020-09-10 12:24:45
40.107.138.88 attack
Spam from jane@linkinfo.biz
2020-09-10 12:07:36
139.59.116.243 attackbots
 TCP (SYN) 139.59.116.243:59711 -> port 22790, len 44
2020-09-10 12:23:41
220.79.74.11 attack
Hits on port : 23
2020-09-10 12:13:28

Recently Reported IPs

179.127.78.146 117.194.91.179 128.75.211.217 58.209.79.121
93.115.70.30 177.44.17.218 78.187.159.139 169.187.204.30
212.154.217.254 117.239.80.70 14.241.69.70 187.243.242.166
186.24.56.50 180.104.4.252 14.177.49.142 182.166.24.237
137.248.58.237 123.18.48.174 188.0.203.152 113.162.60.14