Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: St. Louis

Region: Missouri

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.252.49.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28385
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.252.49.117.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120303 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 04 12:00:19 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 117.49.252.146.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 117.49.252.146.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
120.205.45.252 attack
SSH 15 Failed Logins
2019-08-20 08:47:31
112.220.24.131 attackspam
2019-08-20T00:39:55.287125abusebot-7.cloudsearch.cf sshd\[23243\]: Invalid user ftpuser from 112.220.24.131 port 59906
2019-08-20 09:11:40
218.92.0.184 attackbots
Aug 19 23:27:03 arianus sshd\[20324\]: Unable to negotiate with 218.92.0.184 port 55302: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 \[preauth\]
...
2019-08-20 09:20:15
165.227.49.242 attack
2019-08-20T07:55:15.588070enmeeting.mahidol.ac.th sshd\[5515\]: User root from 165.227.49.242 not allowed because not listed in AllowUsers
2019-08-20T07:55:15.714939enmeeting.mahidol.ac.th sshd\[5515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.49.242  user=root
2019-08-20T07:55:17.947711enmeeting.mahidol.ac.th sshd\[5515\]: Failed password for invalid user root from 165.227.49.242 port 43357 ssh2
...
2019-08-20 09:03:33
62.7.90.34 attackbots
Aug 19 14:44:46 kapalua sshd\[15027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.7.90.34  user=root
Aug 19 14:44:48 kapalua sshd\[15027\]: Failed password for root from 62.7.90.34 port 48805 ssh2
Aug 19 14:49:01 kapalua sshd\[15421\]: Invalid user sysbin from 62.7.90.34
Aug 19 14:49:01 kapalua sshd\[15421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.7.90.34
Aug 19 14:49:03 kapalua sshd\[15421\]: Failed password for invalid user sysbin from 62.7.90.34 port 43607 ssh2
2019-08-20 09:01:19
146.185.239.11 attackspambots
scan r
2019-08-20 08:54:41
59.19.147.198 attackspam
Invalid user qhsupport from 59.19.147.198 port 40406
2019-08-20 09:13:47
191.252.203.92 attackspam
Aug 19 23:53:02 meumeu sshd[7286]: Failed password for invalid user hp from 191.252.203.92 port 60938 ssh2
Aug 19 23:57:53 meumeu sshd[7899]: Failed password for invalid user wkiconsole from 191.252.203.92 port 49624 ssh2
...
2019-08-20 09:44:56
45.94.212.176 attack
Unauthorised access (Aug 19) SRC=45.94.212.176 LEN=40 PREC=0x20 TTL=242 ID=52519 DF TCP DPT=8080 WINDOW=14600 SYN
2019-08-20 08:53:21
206.189.239.103 attackbots
Aug 19 21:39:43 ny01 sshd[27610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.239.103
Aug 19 21:39:45 ny01 sshd[27610]: Failed password for invalid user kernel123 from 206.189.239.103 port 55146 ssh2
Aug 19 21:44:24 ny01 sshd[28104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.239.103
2019-08-20 09:45:20
66.7.148.40 attack
Aug 20 02:37:46 mail postfix/smtpd\[20981\]: warning: unknown\[66.7.148.40\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 02:37:54 mail postfix/smtpd\[21085\]: warning: unknown\[66.7.148.40\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 02:41:17 mail postfix/smtpd\[21085\]: warning: unknown\[66.7.148.40\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-08-20 08:49:32
106.12.56.218 attack
Aug 20 02:50:32 ns3110291 sshd\[597\]: Invalid user skynet from 106.12.56.218
Aug 20 02:50:32 ns3110291 sshd\[597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.56.218 
Aug 20 02:50:34 ns3110291 sshd\[597\]: Failed password for invalid user skynet from 106.12.56.218 port 48842 ssh2
Aug 20 02:54:11 ns3110291 sshd\[869\]: Invalid user copier from 106.12.56.218
Aug 20 02:54:11 ns3110291 sshd\[869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.56.218 
...
2019-08-20 09:29:01
138.99.6.169 attackbots
/App.php?_=15626a2f4cf40
2019-08-20 09:03:50
68.183.234.12 attackbots
2019-08-20T00:48:42.290436abusebot-7.cloudsearch.cf sshd\[23287\]: Invalid user agueda from 68.183.234.12 port 55358
2019-08-20 08:48:59
185.246.75.146 attackspam
Aug 19 23:08:24 hcbbdb sshd\[1618\]: Invalid user rf from 185.246.75.146
Aug 19 23:08:24 hcbbdb sshd\[1618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.246.75.146
Aug 19 23:08:26 hcbbdb sshd\[1618\]: Failed password for invalid user rf from 185.246.75.146 port 36366 ssh2
Aug 19 23:13:57 hcbbdb sshd\[2317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.246.75.146  user=root
Aug 19 23:13:59 hcbbdb sshd\[2317\]: Failed password for root from 185.246.75.146 port 54468 ssh2
2019-08-20 09:39:27

Recently Reported IPs

143.18.76.130 118.121.221.251 223.246.40.64 43.184.205.131
43.41.0.168 128.116.40.55 146.86.200.122 146.9.91.163
73.180.205.100 147.36.205.255 4.233.203.22 160.193.10.194
51.206.89.66 213.22.222.37 136.109.52.110 192.168.42.4
237.120.203.172 10.88.0.253 124.215.220.255 146.43.168.25