Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.49.116.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42400
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.49.116.114.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:58:25 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 114.116.49.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.116.49.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.65.4.64 attackbots
Oct 23 23:01:35 vps647732 sshd[10682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.4.64
Oct 23 23:01:36 vps647732 sshd[10682]: Failed password for invalid user user2006 from 159.65.4.64 port 45862 ssh2
...
2019-10-24 05:15:54
35.220.180.126 attack
Oct 23 23:02:30 mail sshd[7752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.220.180.126 
Oct 23 23:02:33 mail sshd[7752]: Failed password for invalid user harishchandra from 35.220.180.126 port 48216 ssh2
Oct 23 23:10:03 mail sshd[11030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.220.180.126
2019-10-24 05:30:11
92.118.38.37 attack
Oct 23 22:32:51 mail postfix/smtpd\[14613\]: warning: unknown\[92.118.38.37\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 23 22:33:26 mail postfix/smtpd\[15002\]: warning: unknown\[92.118.38.37\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 23 23:03:37 mail postfix/smtpd\[16671\]: warning: unknown\[92.118.38.37\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 23 23:04:13 mail postfix/smtpd\[16225\]: warning: unknown\[92.118.38.37\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-10-24 05:11:48
117.50.5.83 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/117.50.5.83/ 
 
 CN - 1H : (486)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4808 
 
 IP : 117.50.5.83 
 
 CIDR : 117.50.0.0/19 
 
 PREFIX COUNT : 1972 
 
 UNIQUE IP COUNT : 6728192 
 
 
 ATTACKS DETECTED ASN4808 :  
  1H - 2 
  3H - 2 
  6H - 3 
 12H - 5 
 24H - 14 
 
 DateTime : 2019-10-23 22:16:20 
 
 INFO : Port SSH 22 Scan Detected and Blocked by ADMIN  - data recovery
2019-10-24 05:21:21
124.251.110.148 attack
Oct 23 23:11:06 mail sshd[11631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.251.110.148 
Oct 23 23:11:07 mail sshd[11631]: Failed password for invalid user cuisine from 124.251.110.148 port 37368 ssh2
Oct 23 23:16:19 mail sshd[13667]: Failed password for root from 124.251.110.148 port 42856 ssh2
2019-10-24 05:28:49
99.120.85.236 attackspam
squid access log : 9.120.85.236 - admin [23/Oct/2019:22:58:15 +0300] "POST /editBlackAndWhiteList HTTP/1.1" 404 177 "-" "ApiTool"
my squid server is in family members only its ain't public.
2019-10-24 05:23:19
185.232.67.5 attackbots
Oct 23 23:15:36 dedicated sshd[5057]: Invalid user admin from 185.232.67.5 port 41323
2019-10-24 05:35:04
178.62.95.188 attack
Wordpress Admin Login attack
2019-10-24 05:35:30
185.54.179.62 attackbots
10/23/2019-22:16:42.877069 185.54.179.62 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-10-24 05:03:42
77.49.27.33 attack
Autoban   77.49.27.33 AUTH/CONNECT
2019-10-24 05:39:05
181.44.68.66 attackbotsspam
2019-10-23T20:47:53.817308abusebot-5.cloudsearch.cf sshd\[9533\]: Invalid user mailer from 181.44.68.66 port 10747
2019-10-24 05:04:21
103.80.25.109 attack
Oct 22 01:56:01 odroid64 sshd\[17370\]: Invalid user chad from 103.80.25.109
Oct 22 01:56:01 odroid64 sshd\[17370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.80.25.109
Oct 22 01:56:04 odroid64 sshd\[17370\]: Failed password for invalid user chad from 103.80.25.109 port 55039 ssh2
...
2019-10-24 05:36:37
103.113.160.5 attack
Oct 23 22:58:02 mail sshd[5374]: Failed password for root from 103.113.160.5 port 56398 ssh2
Oct 23 23:01:42 mail sshd[7500]: Failed password for root from 103.113.160.5 port 39560 ssh2
2019-10-24 05:29:38
222.186.175.148 attack
2019-10-21 11:13:09 -> 2019-10-23 22:32:32 : 89 login attempts (222.186.175.148)
2019-10-24 05:11:05
5.249.145.245 attack
Oct 23 22:41:51 vps691689 sshd[19588]: Failed password for root from 5.249.145.245 port 39375 ssh2
Oct 23 22:45:22 vps691689 sshd[19628]: Failed password for root from 5.249.145.245 port 58103 ssh2
...
2019-10-24 05:02:47

Recently Reported IPs

22.244.72.211 143.65.110.199 20.194.72.175 59.81.161.64
3.94.90.54 36.239.226.143 77.127.184.10 113.31.204.50
113.96.9.143 181.114.72.182 128.134.92.30 221.50.9.81
200.84.245.46 39.140.208.163 31.145.222.26 64.213.218.110
13.71.104.201 218.216.239.182 151.40.170.70 101.187.61.130