Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.145.126.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18379
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;8.145.126.49.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:50:32 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 49.126.145.8.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.126.145.8.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.3.236.67 attackbotsspam
Brute-force attempt banned
2020-04-20 23:54:11
164.132.225.250 attackspambots
Brute force attempt
2020-04-21 00:05:26
35.199.73.100 attackspambots
Apr 20 17:25:38 santamaria sshd\[9790\]: Invalid user git from 35.199.73.100
Apr 20 17:25:38 santamaria sshd\[9790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.199.73.100
Apr 20 17:25:40 santamaria sshd\[9790\]: Failed password for invalid user git from 35.199.73.100 port 46836 ssh2
...
2020-04-20 23:35:26
178.62.104.58 attack
Apr 20 22:35:21 webhost01 sshd[21766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.104.58
Apr 20 22:35:23 webhost01 sshd[21766]: Failed password for invalid user di from 178.62.104.58 port 39508 ssh2
...
2020-04-21 00:01:26
197.61.84.173 attackspam
Invalid user admin from 197.61.84.173 port 43642
2020-04-20 23:51:52
182.61.45.42 attackspam
Apr 20 17:23:26 DAAP sshd[20794]: Invalid user ne from 182.61.45.42 port 53965
Apr 20 17:23:28 DAAP sshd[20796]: Invalid user ne from 182.61.45.42 port 53967
Apr 20 17:23:26 DAAP sshd[20794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.45.42
Apr 20 17:23:26 DAAP sshd[20794]: Invalid user ne from 182.61.45.42 port 53965
Apr 20 17:23:29 DAAP sshd[20794]: Failed password for invalid user ne from 182.61.45.42 port 53965 ssh2
...
2020-04-20 23:58:11
188.168.82.246 attackbotsspam
Apr 20 18:30:45 gw1 sshd[4029]: Failed password for root from 188.168.82.246 port 57308 ssh2
Apr 20 18:35:37 gw1 sshd[4233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.168.82.246
...
2020-04-20 23:55:06
160.153.234.236 attackbotsspam
Apr 20 15:05:38 Invalid user admin from 160.153.234.236 port 46966
2020-04-21 00:07:39
35.193.160.72 attackspambots
Apr 20 14:47:23 *** sshd[15671]: Invalid user cpanelsammy from 35.193.160.72
2020-04-20 23:35:56
212.237.42.86 attackspambots
Apr 20 13:20:38 ws26vmsma01 sshd[81999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.42.86
Apr 20 13:20:40 ws26vmsma01 sshd[81999]: Failed password for invalid user liferay from 212.237.42.86 port 55458 ssh2
...
2020-04-20 23:46:17
176.31.191.173 attackspam
SSH brutforce
2020-04-21 00:02:52
36.111.184.80 attackbotsspam
Invalid user test1 from 36.111.184.80 port 57910
2020-04-20 23:34:08
5.135.101.228 attack
$f2bV_matches
2020-04-20 23:40:34
179.170.232.71 attack
Invalid user admin from 179.170.232.71 port 52683
2020-04-21 00:00:43
183.134.65.214 attackspam
(sshd) Failed SSH login from 183.134.65.214 (CN/China/-): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 20 15:13:12 andromeda sshd[20667]: Invalid user test2 from 183.134.65.214 port 59138
Apr 20 15:13:14 andromeda sshd[20667]: Failed password for invalid user test2 from 183.134.65.214 port 59138 ssh2
Apr 20 15:38:49 andromeda sshd[21349]: Invalid user test from 183.134.65.214 port 35700
2020-04-20 23:57:16

Recently Reported IPs

66.187.130.59 95.18.136.136 159.23.1.40 20.237.6.190
21.113.218.247 209.200.31.145 62.76.12.142 76.69.151.87
56.177.7.133 48.248.235.123 129.11.86.243 90.2.57.77
114.10.210.160 84.152.213.155 38.8.130.169 149.25.158.123
120.224.154.230 209.36.151.102 147.229.188.173 32.106.156.134