Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hessen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
49.51.132.82 attack
Dec 21 18:20:48 ns382633 sshd\[31393\]: Invalid user Njoseg from 49.51.132.82 port 46158
Dec 21 18:20:48 ns382633 sshd\[31393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.132.82
Dec 21 18:20:50 ns382633 sshd\[31393\]: Failed password for invalid user Njoseg from 49.51.132.82 port 46158 ssh2
Dec 21 18:32:43 ns382633 sshd\[2254\]: Invalid user webmaster from 49.51.132.82 port 35156
Dec 21 18:32:43 ns382633 sshd\[2254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.132.82
2019-12-22 01:33:54
49.51.132.82 attackbotsspam
SSH Bruteforce attempt
2019-12-20 13:52:36
49.51.132.82 attackspam
Dec 18 21:04:07 web9 sshd\[621\]: Invalid user thavone from 49.51.132.82
Dec 18 21:04:07 web9 sshd\[621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.132.82
Dec 18 21:04:10 web9 sshd\[621\]: Failed password for invalid user thavone from 49.51.132.82 port 45246 ssh2
Dec 18 21:09:14 web9 sshd\[1464\]: Invalid user whitehead from 49.51.132.82
Dec 18 21:09:14 web9 sshd\[1464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.132.82
2019-12-19 15:11:57
49.51.132.82 attack
Dec 15 18:44:35 microserver sshd[21828]: Invalid user testproxy from 49.51.132.82 port 51190
Dec 15 18:44:35 microserver sshd[21828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.132.82
Dec 15 18:44:37 microserver sshd[21828]: Failed password for invalid user testproxy from 49.51.132.82 port 51190 ssh2
Dec 15 18:49:50 microserver sshd[22580]: Invalid user beverly from 49.51.132.82 port 59632
Dec 15 18:49:50 microserver sshd[22580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.132.82
Dec 15 19:00:36 microserver sshd[24514]: Invalid user emdal from 49.51.132.82 port 47976
Dec 15 19:00:36 microserver sshd[24514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.132.82
Dec 15 19:00:39 microserver sshd[24514]: Failed password for invalid user emdal from 49.51.132.82 port 47976 ssh2
Dec 15 19:05:54 microserver sshd[25128]: Invalid user smecherul from 49.51.132.82 port 56324
2019-12-16 03:10:19
49.51.132.82 attack
Dec 12 12:46:37 MainVPS sshd[29681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.132.82  user=root
Dec 12 12:46:40 MainVPS sshd[29681]: Failed password for root from 49.51.132.82 port 33002 ssh2
Dec 12 12:52:50 MainVPS sshd[8627]: Invalid user rocco from 49.51.132.82 port 54106
Dec 12 12:52:50 MainVPS sshd[8627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.132.82
Dec 12 12:52:50 MainVPS sshd[8627]: Invalid user rocco from 49.51.132.82 port 54106
Dec 12 12:52:52 MainVPS sshd[8627]: Failed password for invalid user rocco from 49.51.132.82 port 54106 ssh2
...
2019-12-12 20:28:27
49.51.132.82 attackbots
Dec 10 11:31:50 herz-der-gamer sshd[32636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.132.82  user=root
Dec 10 11:31:52 herz-der-gamer sshd[32636]: Failed password for root from 49.51.132.82 port 34228 ssh2
...
2019-12-10 18:39:39
49.51.132.82 attackspambots
Nov 28 22:19:07 php1 sshd\[22959\]: Invalid user moneypenny from 49.51.132.82
Nov 28 22:19:07 php1 sshd\[22959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.132.82
Nov 28 22:19:09 php1 sshd\[22959\]: Failed password for invalid user moneypenny from 49.51.132.82 port 34464 ssh2
Nov 28 22:28:22 php1 sshd\[24000\]: Invalid user tom from 49.51.132.82
Nov 28 22:28:22 php1 sshd\[24000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.132.82
2019-11-29 16:31:32
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.51.132.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59445
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.51.132.100.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 22:38:17 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 100.132.51.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 100.132.51.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.117.63.58 attackbotsspam
Port probing on unauthorized port 23
2020-02-24 20:21:15
93.42.109.154 attack
unauthorized connection attempt
2020-02-24 20:20:28
190.150.118.5 attackbots
Email rejected due to spam filtering
2020-02-24 20:33:57
164.132.83.81 attackspambots
02/24/2020-08:50:20.804282 164.132.83.81 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-02-24 20:18:53
172.105.201.117 attackspam
Unauthorized connection attempt detected from IP address 172.105.201.117 to port 23
2020-02-24 20:53:20
117.102.124.202 attackbotsspam
1582519446 - 02/24/2020 05:44:06 Host: 117.102.124.202/117.102.124.202 Port: 445 TCP Blocked
2020-02-24 20:20:07
119.27.165.134 attackbots
suspicious action Mon, 24 Feb 2020 01:43:54 -0300
2020-02-24 20:26:00
89.248.168.202 attackspam
02/24/2020-06:42:04.057033 89.248.168.202 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-24 20:40:58
61.178.103.137 attack
suspicious action Mon, 24 Feb 2020 01:43:26 -0300
2020-02-24 20:46:10
222.186.175.183 attackspam
Feb 24 13:27:59 tuxlinux sshd[5042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183  user=root
...
2020-02-24 20:45:17
117.1.91.219 attackspambots
1582519396 - 02/24/2020 05:43:16 Host: 117.1.91.219/117.1.91.219 Port: 445 TCP Blocked
2020-02-24 20:51:18
125.227.65.86 attackbots
unauthorized connection attempt
2020-02-24 20:34:29
195.154.45.194 attackspam
[2020-02-24 07:23:51] NOTICE[1148][C-0000b880] chan_sip.c: Call from '' (195.154.45.194:50879) to extension '999999011972592277524' rejected because extension not found in context 'public'.
[2020-02-24 07:23:51] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-24T07:23:51.435-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="999999011972592277524",SessionID="0x7fd82cc0d5f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/195.154.45.194/50879",ACLName="no_extension_match"
[2020-02-24 07:27:19] NOTICE[1148][C-0000b884] chan_sip.c: Call from '' (195.154.45.194:52796) to extension '9999999011972592277524' rejected because extension not found in context 'public'.
[2020-02-24 07:27:19] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-24T07:27:19.397-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="9999999011972592277524",SessionID="0x7fd82cb4f218",LocalAddress="IPV4/UDP/192.168.244.6/5
...
2020-02-24 20:35:55
42.118.12.88 attackspambots
Email rejected due to spam filtering
2020-02-24 20:46:53
151.29.80.250 attackspam
Feb 23 23:26:02 php1 sshd\[29112\]: Invalid user pi from 151.29.80.250
Feb 23 23:26:02 php1 sshd\[29114\]: Invalid user pi from 151.29.80.250
Feb 23 23:26:02 php1 sshd\[29112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.29.80.250
Feb 23 23:26:02 php1 sshd\[29114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.29.80.250
Feb 23 23:26:04 php1 sshd\[29112\]: Failed password for invalid user pi from 151.29.80.250 port 43854 ssh2
2020-02-24 20:38:30

Recently Reported IPs

120.248.86.196 20.168.7.21 176.65.148.203 33.41.3.145
209.244.58.176 223.184.39.101 122.20.5.108 175.4.80.42
44.32.29.131 43.153.128.94 115.180.1.179 120.204.183.51
30.221.172.218 121.7.105.168 56.136.221.235 35.211.144.10
52.104.79.106 192.7.58.176 119.119.71.102 3.188.28.242