Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: London

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
139.162.221.245 attackspambots
Excessive Port-Scanning
2019-11-09 14:03:25
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.221.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21652
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.162.221.49.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:08:58 CST 2022
;; MSG SIZE  rcvd: 107
Host info
49.221.162.139.in-addr.arpa domain name pointer li1384-49.members.linode.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.221.162.139.in-addr.arpa	name = li1384-49.members.linode.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
61.184.223.114 attackspambots
Sep906:33:49server4pure-ftpd:\(\?@61.133.242.251\)[WARNING]Authenticationfailedforuser[www]Sep906:34:11server4pure-ftpd:\(\?@61.133.242.251\)[WARNING]Authenticationfailedforuser[www]Sep906:37:28server4pure-ftpd:\(\?@36.77.95.127\)[WARNING]Authenticationfailedforuser[www]Sep906:23:28server4pure-ftpd:\(\?@61.142.21.7\)[WARNING]Authenticationfailedforuser[www]Sep906:36:49server4pure-ftpd:\(\?@61.142.21.19\)[WARNING]Authenticationfailedforuser[www]Sep906:36:50server4pure-ftpd:\(\?@61.142.21.19\)[WARNING]Authenticationfailedforuser[www]Sep906:36:43server4pure-ftpd:\(\?@61.142.21.19\)[WARNING]Authenticationfailedforuser[www]Sep906:36:44server4pure-ftpd:\(\?@61.142.21.19\)[WARNING]Authenticationfailedforuser[www]Sep906:37:22server4pure-ftpd:\(\?@36.77.95.127\)[WARNING]Authenticationfailedforuser[www]Sep906:37:55server4pure-ftpd:\(\?@61.184.223.114\)[WARNING]Authenticationfailedforuser[www]IPAddressesBlocked:61.133.242.251\(CN/China/-\)36.77.95.127\(ID/Indonesia/-\)61.142.21.7\(CN/China/-\)61.142.21.19\(CN/China/-\)
2019-09-09 15:57:43
81.4.106.152 attackbots
Sep  9 09:43:08 MK-Soft-Root1 sshd\[11467\]: Invalid user kerapetse from 81.4.106.152 port 49862
Sep  9 09:43:08 MK-Soft-Root1 sshd\[11467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.4.106.152
Sep  9 09:43:09 MK-Soft-Root1 sshd\[11467\]: Failed password for invalid user kerapetse from 81.4.106.152 port 49862 ssh2
...
2019-09-09 15:48:08
59.10.6.152 attack
Sep  9 03:43:02 ny01 sshd[3049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.10.6.152
Sep  9 03:43:04 ny01 sshd[3049]: Failed password for invalid user git1 from 59.10.6.152 port 39342 ssh2
Sep  9 03:48:47 ny01 sshd[4054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.10.6.152
2019-09-09 15:58:04
182.73.250.50 attackbots
2019-09-09T07:27:41.775290abusebot-8.cloudsearch.cf sshd\[14140\]: Invalid user tset from 182.73.250.50 port 56620
2019-09-09 15:51:54
218.98.26.173 attackspam
Sep  9 09:40:23 tuxlinux sshd[22153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.173  user=root
...
2019-09-09 15:43:22
51.254.121.129 attack
xmlrpc attack
2019-09-09 15:48:50
103.232.120.109 attackbotsspam
Sep  8 20:59:02 hiderm sshd\[3674\]: Invalid user cod4server from 103.232.120.109
Sep  8 20:59:02 hiderm sshd\[3674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.232.120.109
Sep  8 20:59:05 hiderm sshd\[3674\]: Failed password for invalid user cod4server from 103.232.120.109 port 60282 ssh2
Sep  8 21:07:01 hiderm sshd\[4463\]: Invalid user webadmin from 103.232.120.109
Sep  8 21:07:01 hiderm sshd\[4463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.232.120.109
2019-09-09 15:19:38
54.38.157.147 attackspam
web-1 [ssh] SSH Attack
2019-09-09 15:21:18
77.37.179.243 attack
[portscan] Port scan
2019-09-09 16:00:17
165.22.144.206 attackbots
Sep  8 21:51:08 hcbb sshd\[25072\]: Invalid user user from 165.22.144.206
Sep  8 21:51:08 hcbb sshd\[25072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.144.206
Sep  8 21:51:10 hcbb sshd\[25072\]: Failed password for invalid user user from 165.22.144.206 port 58444 ssh2
Sep  8 21:58:14 hcbb sshd\[25763\]: Invalid user fctrserver from 165.22.144.206
Sep  8 21:58:14 hcbb sshd\[25763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.144.206
2019-09-09 16:05:05
117.121.97.95 attackbotsspam
Sep  8 21:28:03 php2 sshd\[9323\]: Invalid user safeuser from 117.121.97.95
Sep  8 21:28:03 php2 sshd\[9323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.121.97.95
Sep  8 21:28:05 php2 sshd\[9323\]: Failed password for invalid user safeuser from 117.121.97.95 port 49357 ssh2
Sep  8 21:36:42 php2 sshd\[10050\]: Invalid user tommy from 117.121.97.95
Sep  8 21:36:42 php2 sshd\[10050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.121.97.95
2019-09-09 15:47:46
177.190.176.21 attackspambots
port scan and connect, tcp 80 (http)
2019-09-09 15:57:07
50.209.176.166 attackbots
Sep  9 09:55:36 mout sshd[17010]: Invalid user steam from 50.209.176.166 port 58640
2019-09-09 16:02:46
51.75.52.134 attackspam
Sep  8 19:26:16 wbs sshd\[372\]: Invalid user www1234 from 51.75.52.134
Sep  8 19:26:16 wbs sshd\[372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3130931.ip-51-75-52.eu
Sep  8 19:26:18 wbs sshd\[372\]: Failed password for invalid user www1234 from 51.75.52.134 port 41720 ssh2
Sep  8 19:32:22 wbs sshd\[938\]: Invalid user 1q2w3e from 51.75.52.134
Sep  8 19:32:22 wbs sshd\[938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3130931.ip-51-75-52.eu
2019-09-09 15:38:00
220.134.144.96 attackspam
2019-09-09T07:16:11.639299abusebot-8.cloudsearch.cf sshd\[14067\]: Invalid user linuxadmin from 220.134.144.96 port 40532
2019-09-09 15:29:14

Recently Reported IPs

139.162.220.46 139.162.220.72 139.162.222.118 139.162.222.155
139.162.221.57 118.212.107.203 139.162.222.231 139.162.223.208
139.162.223.156 139.162.223.6 139.162.223.163 118.212.107.204
139.162.222.66 139.162.224.42 139.162.223.78 139.162.224.54
139.162.224.191 139.162.224.105 139.162.224.50 139.162.224.83