Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: Valaiscom AG

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
Nov 17 23:39:25 srv206 sshd[19546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18-49-145-5.dyn.cable.fcom.ch  user=root
Nov 17 23:39:28 srv206 sshd[19546]: Failed password for root from 5.145.49.18 port 52757 ssh2
Nov 17 23:39:29 srv206 sshd[19546]: Failed password for root from 5.145.49.18 port 52757 ssh2
Nov 17 23:39:25 srv206 sshd[19546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18-49-145-5.dyn.cable.fcom.ch  user=root
Nov 17 23:39:28 srv206 sshd[19546]: Failed password for root from 5.145.49.18 port 52757 ssh2
Nov 17 23:39:29 srv206 sshd[19546]: Failed password for root from 5.145.49.18 port 52757 ssh2
...
2019-11-18 09:13:26
attackspambots
Oct 12 08:02:13 MK-Soft-Root1 sshd[21815]: Failed password for root from 5.145.49.18 port 58792 ssh2
Oct 12 08:02:16 MK-Soft-Root1 sshd[21815]: Failed password for root from 5.145.49.18 port 58792 ssh2
...
2019-10-12 15:51:13
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.145.49.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22468
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.145.49.18.			IN	A

;; AUTHORITY SECTION:
.			545	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101200 1800 900 604800 86400

;; Query time: 221 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 12 15:51:08 CST 2019
;; MSG SIZE  rcvd: 115
Host info
18.49.145.5.in-addr.arpa domain name pointer 18-49-145-5.dyn.cable.fcom.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
18.49.145.5.in-addr.arpa	name = 18-49-145-5.dyn.cable.fcom.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
91.242.78.4 attackspam
Unauthorised access (Nov  8) SRC=91.242.78.4 LEN=52 TTL=116 ID=6622 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-08 17:40:53
91.90.97.226 attackspambots
ssh failed login
2019-11-08 17:46:20
104.155.47.43 attackbotsspam
POST /wp-login.php HTTP/1.1 200 1827 Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0
2019-11-08 17:39:44
179.42.187.179 attack
Honeypot attack, port: 23, PTR: host179.179.42.187.neophone.com.ar.
2019-11-08 17:44:20
86.98.13.58 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2019-11-08 18:11:57
189.8.68.56 attack
Nov  8 10:12:22 icinga sshd[14826]: Failed password for root from 189.8.68.56 port 43070 ssh2
...
2019-11-08 17:51:18
178.128.255.8 attackbotsspam
178.128.255.8 was recorded 5 times by 5 hosts attempting to connect to the following ports: 1597. Incident counter (4h, 24h, all-time): 5, 31, 99
2019-11-08 17:52:15
80.17.178.54 attack
(sshd) Failed SSH login from 80.17.178.54 (IT/Italy/-/-/host54-178-static.17-80-b.business.telecomitalia.it/[AS3269 Telecom Italia]): 1 in the last 3600 secs
2019-11-08 18:06:32
179.181.248.74 attackspambots
Honeypot attack, port: 23, PTR: 179.181.248.74.dynamic.adsl.gvt.net.br.
2019-11-08 17:41:15
183.88.42.20 attack
Honeypot attack, port: 445, PTR: mx-ll-183.88.42-20.dynamic.3bb.co.th.
2019-11-08 18:14:52
207.248.62.98 attackbotsspam
2019-11-08T07:31:11.681712abusebot-4.cloudsearch.cf sshd\[5216\]: Invalid user 123456 from 207.248.62.98 port 45140
2019-11-08 18:18:15
114.67.225.36 attackbots
$f2bV_matches
2019-11-08 17:56:36
217.107.219.154 attack
WP_xmlrpc_attack
2019-11-08 18:11:22
54.38.178.106 attack
Masscan Port Scanning Tool PA
2019-11-08 17:45:28
218.76.158.162 attack
Nov  8 07:26:14 MK-Soft-VM6 sshd[22372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.76.158.162 
Nov  8 07:26:16 MK-Soft-VM6 sshd[22372]: Failed password for invalid user liuyanyun@521 from 218.76.158.162 port 37507 ssh2
...
2019-11-08 18:14:09

Recently Reported IPs

203.128.84.60 176.122.87.102 117.213.228.204 89.252.147.44
64.202.190.59 182.139.40.61 117.221.193.51 5.235.252.156
89.199.49.65 118.174.64.7 202.112.57.41 183.192.249.160
136.232.29.142 115.206.145.163 222.67.21.23 183.91.4.104
171.7.70.208 14.176.231.250 171.8.76.2 200.57.193.5