Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.58.137.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30818
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.58.137.53.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 01:41:25 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 53.137.58.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.137.58.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
71.6.232.6 attackspam
06/11/2020-02:35:33.863122 71.6.232.6 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 71
2020-06-11 14:38:45
175.126.62.163 attackbots
/wp-login.php
2020-06-11 14:35:13
103.232.120.109 attackbotsspam
Brute force attempt
2020-06-11 14:44:02
68.116.41.6 attack
Unauthorised connection attempt detected at AUO FR1 NODE2. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-11 15:01:17
118.25.10.238 attack
SSH Bruteforce Attempt (failed auth)
2020-06-11 15:02:56
106.12.148.201 attackbots
Wordpress malicious attack:[sshd]
2020-06-11 14:48:12
201.91.86.28 attackbotsspam
Jun 11 00:24:58 ny01 sshd[13180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.91.86.28
Jun 11 00:24:59 ny01 sshd[13180]: Failed password for invalid user db2inst2 from 201.91.86.28 port 6138 ssh2
Jun 11 00:28:26 ny01 sshd[14149]: Failed password for root from 201.91.86.28 port 8162 ssh2
2020-06-11 14:44:33
108.162.245.42 attack
Apache - FakeGoogleBot
2020-06-11 14:55:41
190.210.238.77 attackbots
Invalid user teamspeak3 from 190.210.238.77 port 40596
2020-06-11 15:10:19
193.56.28.116 attackspambots
(smtpauth) Failed SMTP AUTH login from 193.56.28.116 (GB/United Kingdom/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-06-11 08:25:27 login authenticator failed for (ADMIN) [193.56.28.116]: 535 Incorrect authentication data (set_id=export@rahapharm.com)
2020-06-11 14:53:38
103.23.102.3 attackspambots
Invalid user service from 103.23.102.3 port 47484
2020-06-11 15:06:44
211.159.173.25 attack
Jun 11 01:56:41 firewall sshd[27522]: Invalid user new from 211.159.173.25
Jun 11 01:56:43 firewall sshd[27522]: Failed password for invalid user new from 211.159.173.25 port 52726 ssh2
Jun 11 02:00:57 firewall sshd[27715]: Invalid user admin from 211.159.173.25
...
2020-06-11 15:11:40
68.183.48.172 attack
Jun 10 23:56:02 mail sshd\[8667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.48.172  user=root
...
2020-06-11 14:36:08
45.55.233.213 attackbotsspam
Invalid user bonnie from 45.55.233.213 port 59714
2020-06-11 15:05:11
51.83.42.108 attackbotsspam
Jun 11 07:10:53 pkdns2 sshd\[64593\]: Invalid user sjy from 51.83.42.108Jun 11 07:10:54 pkdns2 sshd\[64593\]: Failed password for invalid user sjy from 51.83.42.108 port 60276 ssh2Jun 11 07:13:57 pkdns2 sshd\[64687\]: Invalid user admin from 51.83.42.108Jun 11 07:13:59 pkdns2 sshd\[64687\]: Failed password for invalid user admin from 51.83.42.108 port 60776 ssh2Jun 11 07:17:08 pkdns2 sshd\[64859\]: Invalid user install from 51.83.42.108Jun 11 07:17:10 pkdns2 sshd\[64859\]: Failed password for invalid user install from 51.83.42.108 port 33046 ssh2
...
2020-06-11 15:00:30

Recently Reported IPs

52.213.75.116 69.251.21.240 126.113.48.158 86.150.85.131
50.133.110.88 52.142.172.188 33.133.120.22 235.216.244.0
255.41.157.104 150.38.246.50 83.203.38.251 101.176.147.175
208.143.63.146 74.6.18.177 142.228.222.209 242.181.32.141
55.66.26.19 45.135.113.48 14.242.198.195 179.30.87.117