Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.0.199.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65261
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.0.199.49.			IN	A

;; AUTHORITY SECTION:
.			592	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 129 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 04:15:54 CST 2022
;; MSG SIZE  rcvd: 103
Host info
49.199.0.1.in-addr.arpa domain name pointer node-e29.pool-1-0.dynamic.totinternet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.199.0.1.in-addr.arpa	name = node-e29.pool-1-0.dynamic.totinternet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
203.146.170.167 attack
Nov 15 01:28:46 ns381471 sshd[30930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.146.170.167
Nov 15 01:28:47 ns381471 sshd[30930]: Failed password for invalid user sanriosmiles from 203.146.170.167 port 55545 ssh2
2019-11-15 09:04:51
103.74.123.6 attackspambots
Banned for posting to wp-login.php without referer {"log":"agent-677383","pwd":"12345","wp-submit":"Log In","redirect_to":"http:\/\/dinarealtor.com\/wp-admin\/","testcookie":"1"}
2019-11-15 13:09:47
192.95.30.27 attack
Banned for posting to wp-login.php without referer {"log":"agent-311433","pwd":"12345","wp-submit":"Log In","redirect_to":"http:\/\/karensellsit.com\/wp-admin\/","testcookie":"1"}
2019-11-15 13:00:39
180.250.124.227 attackspambots
2019-11-15T05:01:54.290773abusebot-5.cloudsearch.cf sshd\[12602\]: Invalid user applmgr from 180.250.124.227 port 59978
2019-11-15 13:18:10
189.32.130.125 attack
19/11/14@23:59:50: FAIL: IoT-Telnet address from=189.32.130.125
...
2019-11-15 13:16:27
14.198.6.164 attackspam
$f2bV_matches
2019-11-15 13:12:21
93.48.89.238 attackspam
Automatic report - Banned IP Access
2019-11-15 13:13:02
138.59.18.110 attack
$f2bV_matches
2019-11-15 13:07:44
182.61.136.23 attack
Nov 15 04:24:02 XXXXXX sshd[9897]: Invalid user cristal from 182.61.136.23 port 58764
2019-11-15 13:07:03
208.68.39.164 attackbotsspam
$f2bV_matches
2019-11-15 09:04:21
183.88.23.71 attackspambots
2019-11-15T04:59:47.106540abusebot.cloudsearch.cf sshd\[24581\]: Invalid user talbert from 183.88.23.71 port 45354
2019-11-15 13:17:57
45.136.109.243 attackbots
45.136.109.243 was recorded 5 times by 5 hosts attempting to connect to the following ports: 3389. Incident counter (4h, 24h, all-time): 5, 43, 2034
2019-11-15 08:53:20
141.255.162.36 attack
3389BruteforceFW22
2019-11-15 09:04:10
138.59.216.7 attack
$f2bV_matches
2019-11-15 13:03:49
54.39.98.253 attackspambots
leo_www
2019-11-15 08:54:16

Recently Reported IPs

142.125.144.15 1.0.199.61 1.0.199.70 1.0.199.75
1.0.199.83 1.0.200.104 205.16.8.56 1.0.200.111
1.0.200.115 1.0.200.120 1.0.200.122 1.0.200.126
1.0.200.13 1.0.200.136 1.0.200.138 1.0.200.142
1.0.200.148 1.0.200.152 137.157.91.218 1.0.200.157