Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.242.116.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44713
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.242.116.49.			IN	A

;; AUTHORITY SECTION:
.			137	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020601 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 12:43:23 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 49.116.242.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.116.242.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.158.62.240 attack
2020-04-26T05:55:42.637148  sshd[2553]: Invalid user ela from 202.158.62.240 port 34707
2020-04-26T05:55:42.652163  sshd[2553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.62.240
2020-04-26T05:55:42.637148  sshd[2553]: Invalid user ela from 202.158.62.240 port 34707
2020-04-26T05:55:44.041457  sshd[2553]: Failed password for invalid user ela from 202.158.62.240 port 34707 ssh2
...
2020-04-26 13:09:08
115.231.156.236 attack
(sshd) Failed SSH login from 115.231.156.236 (CN/China/-): 5 in the last 3600 secs
2020-04-26 13:13:35
120.131.3.144 attackspambots
Apr 26 05:45:50 ns382633 sshd\[25801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.3.144  user=root
Apr 26 05:45:53 ns382633 sshd\[25801\]: Failed password for root from 120.131.3.144 port 50229 ssh2
Apr 26 05:55:18 ns382633 sshd\[27558\]: Invalid user scenes from 120.131.3.144 port 36055
Apr 26 05:55:18 ns382633 sshd\[27558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.3.144
Apr 26 05:55:20 ns382633 sshd\[27558\]: Failed password for invalid user scenes from 120.131.3.144 port 36055 ssh2
2020-04-26 13:22:36
134.175.28.62 attack
fail2ban -- 134.175.28.62
...
2020-04-26 13:07:41
185.50.149.14 attackbotsspam
2020-04-26 06:59:31 dovecot_login authenticator failed for \(\[185.50.149.14\]\) \[185.50.149.14\]: 535 Incorrect authentication data \(set_id=info@orogest.it\)
2020-04-26 06:59:40 dovecot_login authenticator failed for \(\[185.50.149.14\]\) \[185.50.149.14\]: 535 Incorrect authentication data
2020-04-26 06:59:51 dovecot_login authenticator failed for \(\[185.50.149.14\]\) \[185.50.149.14\]: 535 Incorrect authentication data
2020-04-26 06:59:56 dovecot_login authenticator failed for \(\[185.50.149.14\]\) \[185.50.149.14\]: 535 Incorrect authentication data
2020-04-26 07:00:11 dovecot_login authenticator failed for \(\[185.50.149.14\]\) \[185.50.149.14\]: 535 Incorrect authentication data
2020-04-26 13:00:56
106.12.70.115 attackbots
$f2bV_matches
2020-04-26 12:56:34
152.32.252.251 attackbotsspam
(sshd) Failed SSH login from 152.32.252.251 (HK/Hong Kong/-): 5 in the last 3600 secs
2020-04-26 13:03:25
84.92.92.196 attackspam
Invalid user hakim from 84.92.92.196 port 48554
2020-04-26 13:00:24
191.193.165.198 attackspambots
Apr 26 06:51:40 nextcloud sshd\[2608\]: Invalid user bich from 191.193.165.198
Apr 26 06:51:40 nextcloud sshd\[2608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.193.165.198
Apr 26 06:51:43 nextcloud sshd\[2608\]: Failed password for invalid user bich from 191.193.165.198 port 53698 ssh2
2020-04-26 13:03:06
41.226.11.252 attackbots
2020-04-25T21:55:52.187933linuxbox-skyline sshd[77544]: Invalid user yl from 41.226.11.252 port 60537
...
2020-04-26 13:05:24
106.12.22.159 attackspambots
Apr 26 04:46:05 game-panel sshd[4662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.22.159
Apr 26 04:46:07 game-panel sshd[4662]: Failed password for invalid user berta from 106.12.22.159 port 55682 ssh2
Apr 26 04:50:29 game-panel sshd[4940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.22.159
2020-04-26 13:01:44
185.50.149.3 attack
2020-04-26T05:42:41.619929l03.customhost.org.uk postfix/smtps/smtpd[25028]: warning: unknown[185.50.149.3]: SASL LOGIN authentication failed: authentication failure
2020-04-26T05:42:52.731303l03.customhost.org.uk postfix/smtps/smtpd[25028]: warning: unknown[185.50.149.3]: SASL LOGIN authentication failed: authentication failure
2020-04-26T05:48:10.901622l03.customhost.org.uk postfix/smtps/smtpd[26161]: warning: unknown[185.50.149.3]: SASL LOGIN authentication failed: authentication failure
2020-04-26T05:48:21.440666l03.customhost.org.uk postfix/smtps/smtpd[26161]: warning: unknown[185.50.149.3]: SASL LOGIN authentication failed: authentication failure
...
2020-04-26 13:01:13
104.248.29.213 attackbotsspam
Automatic report - XMLRPC Attack
2020-04-26 13:14:00
194.182.86.11 attackspambots
" "
2020-04-26 13:26:08
150.109.99.68 attackspam
2020-04-26T03:49:12.986437dmca.cloudsearch.cf sshd[17930]: Invalid user pod from 150.109.99.68 port 44590
2020-04-26T03:49:12.992177dmca.cloudsearch.cf sshd[17930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.99.68
2020-04-26T03:49:12.986437dmca.cloudsearch.cf sshd[17930]: Invalid user pod from 150.109.99.68 port 44590
2020-04-26T03:49:15.175317dmca.cloudsearch.cf sshd[17930]: Failed password for invalid user pod from 150.109.99.68 port 44590 ssh2
2020-04-26T03:55:20.368713dmca.cloudsearch.cf sshd[18433]: Invalid user dnd from 150.109.99.68 port 57898
2020-04-26T03:55:20.374037dmca.cloudsearch.cf sshd[18433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.99.68
2020-04-26T03:55:20.368713dmca.cloudsearch.cf sshd[18433]: Invalid user dnd from 150.109.99.68 port 57898
2020-04-26T03:55:22.411507dmca.cloudsearch.cf sshd[18433]: Failed password for invalid user dnd from 150.109.99.68 port 578
...
2020-04-26 13:21:12

Recently Reported IPs

36.142.143.26 187.226.104.25 113.11.60.249 201.152.131.110
189.213.227.30 42.51.39.139 120.204.134.252 120.229.162.250
123.129.65.224 118.173.63.15 138.117.182.237 112.78.47.186
49.64.102.94 186.147.254.122 113.116.192.35 94.191.152.10
223.184.199.73 141.179.28.44 31.40.151.17 211.36.141.37