Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.20.211.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23319
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.20.211.49.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024122300 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 23 14:16:00 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 49.211.20.166.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.211.20.166.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.130.212.200 attackspambots
Brute forcing RDP port 3389
2020-03-14 07:41:10
123.194.35.190 attackspam
Unauthorized connection attempt from IP address 123.194.35.190 on Port 445(SMB)
2020-03-14 07:34:40
123.148.146.48 attack
WordPress brute force
2020-03-14 07:35:26
140.143.247.230 attackspam
Mar 13 22:11:04 [host] sshd[3673]: pam_unix(sshd:a
Mar 13 22:11:07 [host] sshd[3673]: Failed password
Mar 13 22:14:09 [host] sshd[3734]: Invalid user hu
2020-03-14 08:08:38
39.37.241.253 attackbots
WordPress brute force
2020-03-14 07:25:42
176.113.115.11 attackspam
RDP brute forcing (r)
2020-03-14 07:38:41
34.80.135.20 attackbots
SSH brute force attempt
2020-03-14 07:59:29
123.148.144.254 attackbotsspam
WordPress brute force
2020-03-14 07:37:15
164.132.57.16 attackspambots
Invalid user superman from 164.132.57.16 port 53165
2020-03-14 07:50:58
41.57.64.130 attackspambots
WordPress brute force
2020-03-14 07:25:22
152.136.203.208 attackspambots
Mar 13 22:14:13 mout sshd[11006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.203.208  user=root
Mar 13 22:14:15 mout sshd[11006]: Failed password for root from 152.136.203.208 port 50092 ssh2
2020-03-14 08:06:24
193.254.234.246 attackspambots
SSH bruteforce (Triggered fail2ban)
2020-03-14 07:36:59
51.15.37.97 attackbotsspam
sie-0 : Trying access unauthorized files=>/media/k2/items/cache/index.php()
2020-03-14 07:46:22
190.78.19.37 attackspambots
1584134085 - 03/13/2020 22:14:45 Host: 190.78.19.37/190.78.19.37 Port: 445 TCP Blocked
2020-03-14 07:47:55
154.223.171.100 attackbots
Mar 13 22:47:34 [host] sshd[5071]: pam_unix(sshd:a
Mar 13 22:47:36 [host] sshd[5071]: Failed password
Mar 13 22:55:51 [host] sshd[5139]: pam_unix(sshd:a
2020-03-14 07:44:12

Recently Reported IPs

132.213.212.198 137.55.160.189 231.227.160.219 180.163.232.71
75.100.33.255 208.104.76.208 32.81.193.167 70.140.139.152
37.240.220.205 130.115.91.52 172.168.74.173 163.10.153.182
148.7.159.187 205.44.203.125 2.4.69.172 131.169.211.51
119.34.86.97 17.37.78.155 200.103.58.46 4.158.192.146