Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.49.49.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39058
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.49.49.72.			IN	A

;; AUTHORITY SECTION:
.			596	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 03:48:07 CST 2022
;; MSG SIZE  rcvd: 104
Host info
72.49.49.13.in-addr.arpa domain name pointer ec2-13-49-49-72.eu-north-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
72.49.49.13.in-addr.arpa	name = ec2-13-49-49-72.eu-north-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
202.191.132.153 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-24 01:38:41
37.187.192.162 attackbotsspam
detected by Fail2Ban
2019-10-24 01:29:17
201.218.249.146 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-24 01:25:16
79.133.56.144 attackspam
Invalid user vb@123 from 79.133.56.144 port 32994
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.133.56.144
Failed password for invalid user vb@123 from 79.133.56.144 port 32994 ssh2
Invalid user thejoel from 79.133.56.144 port 38582
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.133.56.144
2019-10-24 01:17:01
138.197.78.121 attackspambots
2019-10-23T16:24:41.830904scmdmz1 sshd\[3063\]: Invalid user oracle from 138.197.78.121 port 59592
2019-10-23T16:24:41.833368scmdmz1 sshd\[3063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.78.121
2019-10-23T16:24:43.768616scmdmz1 sshd\[3063\]: Failed password for invalid user oracle from 138.197.78.121 port 59592 ssh2
...
2019-10-24 01:39:43
45.136.110.41 attack
Oct 23 18:25:30 h2177944 kernel: \[4723781.683022\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.41 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=7222 PROTO=TCP SPT=58243 DPT=7667 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 23 18:32:03 h2177944 kernel: \[4724174.557902\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.41 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=21205 PROTO=TCP SPT=58243 DPT=53333 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 23 18:43:04 h2177944 kernel: \[4724835.085496\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.41 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=2514 PROTO=TCP SPT=58243 DPT=8555 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 23 18:57:32 h2177944 kernel: \[4725702.886142\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.41 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=50878 PROTO=TCP SPT=58243 DPT=8225 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 23 19:25:00 h2177944 kernel: \[4727351.068566\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.41 DST=85.214.117.9
2019-10-24 01:41:35
220.135.232.45 attack
Port Scan
2019-10-24 01:44:10
162.247.74.216 attack
Oct 23 13:11:37 thevastnessof sshd[17867]: error: maximum authentication attempts exceeded for root from 162.247.74.216 port 43354 ssh2 [preauth]
...
2019-10-24 01:38:22
148.70.223.29 attackbots
Oct 23 18:09:24 server sshd\[10743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.223.29  user=root
Oct 23 18:09:27 server sshd\[10743\]: Failed password for root from 148.70.223.29 port 37880 ssh2
Oct 23 18:24:33 server sshd\[15692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.223.29  user=root
Oct 23 18:24:35 server sshd\[15692\]: Failed password for root from 148.70.223.29 port 44052 ssh2
Oct 23 18:37:45 server sshd\[19446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.223.29  user=root
...
2019-10-24 01:19:22
89.165.57.169 attackspambots
Oct 23 13:43:32 MK-Soft-VM3 sshd[19607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.165.57.169 
Oct 23 13:43:34 MK-Soft-VM3 sshd[19607]: Failed password for invalid user tit0nich from 89.165.57.169 port 64794 ssh2
...
2019-10-24 01:45:28
217.182.74.116 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-10-24 01:57:34
123.21.254.120 attackspam
ssh failed login
2019-10-24 01:37:16
156.212.237.66 attackspam
ssh failed login
2019-10-24 01:20:45
94.228.198.44 attackbotsspam
Port 1433 Scan
2019-10-24 01:10:53
80.17.178.54 attackbotsspam
Oct 23 05:54:47 www sshd[15894]: Failed password for r.r from 80.17.178.54 port 10305 ssh2
Oct 23 05:54:47 www sshd[15894]: Received disconnect from 80.17.178.54: 11: Bye Bye [preauth]
Oct 23 06:14:59 www sshd[16164]: Failed password for r.r from 80.17.178.54 port 5697 ssh2
Oct 23 06:15:00 www sshd[16164]: Received disconnect from 80.17.178.54: 11: Bye Bye [preauth]
Oct 23 06:19:01 www sshd[16196]: Invalid user aj from 80.17.178.54
Oct 23 06:19:02 www sshd[16196]: Failed password for invalid user aj from 80.17.178.54 port 41185 ssh2
Oct 23 06:19:02 www sshd[16196]: Received disconnect from 80.17.178.54: 11: Bye Bye [preauth]
Oct 23 06:23:00 www sshd[16268]: Invalid user ps3 from 80.17.178.54
Oct 23 06:23:02 www sshd[16268]: Failed password for invalid user ps3 from 80.17.178.54 port 14049 ssh2
Oct 23 06:23:02 www sshd[16268]: Received disconnect from 80.17.178.54: 11: Bye Bye [preauth]
Oct 23 06:27:05 www sshd[16496]: Failed password for r.r from 80.17.178.54 port 48481........
-------------------------------
2019-10-24 01:37:46

Recently Reported IPs

13.49.49.251 13.49.76.29 13.49.216.6 13.49.46.27
13.49.82.247 13.49.6.165 13.49.210.201 13.49.238.75
13.49.249.164 13.49.63.83 13.49.80.10 184.235.43.176
13.49.89.79 13.51.124.229 13.5.194.93 13.51.129.231
13.51.197.1 13.51.158.238 13.51.131.184 13.51.157.71