Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tokyo

Region: Tokyo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.104.49.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36323
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.104.49.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026011000 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 10 14:39:15 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 20.49.104.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.49.104.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
5.255.253.105 attackspambots
[Mon Aug 24 16:11:08.217255 2020] [:error] [pid 26239:tid 140275657479936] [client 5.255.253.105:51726] [client 5.255.253.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "X0OELBdZ9muyTgqhHEybHQAAAe8"]
...
2020-08-24 18:39:45
103.31.47.58 attackspambots
*Port Scan* detected from 103.31.47.58 (ID/Indonesia/Jakarta/Kuningan Barat/srv2806.mugen.co.id). 4 hits in the last 205 seconds
2020-08-24 18:33:41
193.95.247.90 attackbots
Aug 24 00:00:12 Tower sshd[6372]: Connection from 193.95.247.90 port 43364 on 192.168.10.220 port 22 rdomain ""
Aug 24 00:00:13 Tower sshd[6372]: Invalid user julie from 193.95.247.90 port 43364
Aug 24 00:00:13 Tower sshd[6372]: error: Could not get shadow information for NOUSER
Aug 24 00:00:13 Tower sshd[6372]: Failed password for invalid user julie from 193.95.247.90 port 43364 ssh2
Aug 24 00:00:13 Tower sshd[6372]: Received disconnect from 193.95.247.90 port 43364:11: Bye Bye [preauth]
Aug 24 00:00:13 Tower sshd[6372]: Disconnected from invalid user julie 193.95.247.90 port 43364 [preauth]
2020-08-24 18:48:17
200.71.237.250 attackbots
Icarus honeypot on github
2020-08-24 18:24:13
124.152.118.131 attackspam
$f2bV_matches
2020-08-24 18:37:33
122.176.25.163 attack
20/8/23@23:50:41: FAIL: Alarm-Intrusion address from=122.176.25.163
...
2020-08-24 18:37:58
185.50.25.34 attack
185.50.25.34 - - [24/Aug/2020:07:19:19 +0100] "POST /wp-login.php HTTP/1.1" 200 2121 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
185.50.25.34 - - [24/Aug/2020:07:19:20 +0100] "POST /wp-login.php HTTP/1.1" 200 2116 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
185.50.25.34 - - [24/Aug/2020:07:19:22 +0100] "POST /wp-login.php HTTP/1.1" 200 2086 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-24 18:20:55
198.245.53.163 attack
2020-08-24T04:02:05.509068linuxbox-skyline sshd[110071]: Invalid user seongmin from 198.245.53.163 port 56590
...
2020-08-24 18:04:24
216.218.206.66 attackspambots
1598264349 - 08/24/2020 12:19:09 Host: 216.218.206.66/216.218.206.66 Port: 8080 TCP Blocked
2020-08-24 18:22:57
185.220.102.250 attack
Fail2Ban
2020-08-24 18:20:02
194.170.156.9 attackbotsspam
2020-08-24T10:18:33.364347abusebot.cloudsearch.cf sshd[11293]: Invalid user ajc from 194.170.156.9 port 32912
2020-08-24T10:18:33.369515abusebot.cloudsearch.cf sshd[11293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.170.156.9
2020-08-24T10:18:33.364347abusebot.cloudsearch.cf sshd[11293]: Invalid user ajc from 194.170.156.9 port 32912
2020-08-24T10:18:35.102063abusebot.cloudsearch.cf sshd[11293]: Failed password for invalid user ajc from 194.170.156.9 port 32912 ssh2
2020-08-24T10:22:15.155313abusebot.cloudsearch.cf sshd[11412]: Invalid user odoo from 194.170.156.9 port 58123
2020-08-24T10:22:15.161596abusebot.cloudsearch.cf sshd[11412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.170.156.9
2020-08-24T10:22:15.155313abusebot.cloudsearch.cf sshd[11412]: Invalid user odoo from 194.170.156.9 port 58123
2020-08-24T10:22:16.703539abusebot.cloudsearch.cf sshd[11412]: Failed password for invalid us
...
2020-08-24 18:44:29
198.245.50.81 attack
Aug 24 11:46:45 ns382633 sshd\[8361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.50.81  user=root
Aug 24 11:46:46 ns382633 sshd\[8361\]: Failed password for root from 198.245.50.81 port 58760 ssh2
Aug 24 11:48:16 ns382633 sshd\[8543\]: Invalid user ralph from 198.245.50.81 port 49470
Aug 24 11:48:16 ns382633 sshd\[8543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.50.81
Aug 24 11:48:17 ns382633 sshd\[8543\]: Failed password for invalid user ralph from 198.245.50.81 port 49470 ssh2
2020-08-24 18:04:39
91.121.93.21 attackspam
2020-08-24T13:02:20.588328mail.standpoint.com.ua sshd[28952]: Failed password for storage from 91.121.93.21 port 60883 ssh2
2020-08-24T13:02:22.468939mail.standpoint.com.ua sshd[28952]: Failed password for storage from 91.121.93.21 port 60883 ssh2
2020-08-24T13:02:24.640051mail.standpoint.com.ua sshd[28952]: Failed password for storage from 91.121.93.21 port 60883 ssh2
2020-08-24T13:02:26.737641mail.standpoint.com.ua sshd[28952]: Failed password for storage from 91.121.93.21 port 60883 ssh2
2020-08-24T13:02:28.443332mail.standpoint.com.ua sshd[28952]: Failed password for storage from 91.121.93.21 port 60883 ssh2
...
2020-08-24 18:39:16
84.39.188.170 attack
SSH Scan
2020-08-24 18:27:12
193.243.165.142 attackbotsspam
Aug 24 00:47:58 mockhub sshd[9791]: Failed password for root from 193.243.165.142 port 47667 ssh2
Aug 24 00:51:41 mockhub sshd[9919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.243.165.142
...
2020-08-24 18:50:39

Recently Reported IPs

212.73.148.24 136.0.254.230 185.177.72.62 40.124.175.103
188.166.163.219 14.212.60.155 40.74.212.73 20.118.216.147
39.100.78.180 192.81.217.215 169.150.209.215 102.48.36.63
182.88.190.243 49.84.213.178 173.232.3.139 74.222.3.151
142.171.27.70 1.47.196.249 5.34.218.79 39.185.72.155