Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dan Sai

Region: Loei

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
1.20.217.151 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-30 17:42:40
1.20.217.104 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 11:04:21
1.20.217.50 attackbotsspam
Unauthorized connection attempt from IP address 1.20.217.50 on Port 445(SMB)
2020-02-13 20:03:11
1.20.217.221 attack
Automatic report - XMLRPC Attack
2019-10-31 08:26:09
1.20.217.20 attack
Chat Spam
2019-10-29 17:28:30
1.20.217.78 attackspambots
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 09:36:01
1.20.217.173 attackbotsspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(06240931)
2019-06-25 05:34:36
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.20.217.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36925
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.20.217.49.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 08:01:22 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 49.217.20.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.217.20.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.182.54.6 attack
Scanning random ports - tries to find possible vulnerable services
2019-11-03 06:52:53
203.76.222.5 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-11-03 06:52:40
198.108.67.137 attackbotsspam
ET DROP Dshield Block Listed Source group 1 - port: 4567 proto: TCP cat: Misc Attack
2019-11-03 07:01:02
194.103.134.11 attack
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:05:57
200.146.204.105 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-11-03 06:59:20
210.14.40.227 attack
Scanning random ports - tries to find possible vulnerable services
2019-11-03 06:49:28
187.137.127.57 attackspambots
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:18:42
194.8.144.47 attackbotsspam
Unauthorized connection attempt from IP address 194.8.144.47 on Port 445(SMB)
2019-11-03 07:06:45
188.50.103.85 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:17:09
202.39.254.165 attack
Scanning random ports - tries to find possible vulnerable services
2019-11-03 06:54:29
222.173.27.38 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2019-11-03 06:45:12
205.185.121.44 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-11-03 06:50:42
209.49.113.162 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-11-03 06:49:58
189.236.31.241 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:14:18
187.152.235.154 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-11-03 07:18:03

Recently Reported IPs

1.2.248.71 1.20.61.113 1.200.177.196 1.202.112.48
1.202.112.99 1.202.113.189 1.204.151.222 1.205.150.20
1.207.242.7 1.22.176.166 1.221.114.235 1.223.105.186
1.26.216.243 1.225.41.38 1.27.156.211 1.30.128.35
1.29.215.147 1.29.133.207 1.30.250.150 1.30.8.35