Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Turkey

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.49.126.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13768
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.49.126.12.			IN	A

;; AUTHORITY SECTION:
.			430	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 22:17:43 CST 2022
;; MSG SIZE  rcvd: 106
Host info
12.126.49.194.in-addr.arpa domain name pointer www.verimor.com.tr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.126.49.194.in-addr.arpa	name = www.verimor.com.tr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.234.7.196 attackspambots
[ssh] SSH attack
2020-06-09 05:34:08
118.170.50.39 attackspambots
Port Scan detected!
...
2020-06-09 05:25:14
141.98.81.209 attackspam
Jun  8 21:09:44 *** sshd[25390]: User root from 141.98.81.209 not allowed because not listed in AllowUsers
2020-06-09 05:43:22
168.62.174.233 attackspambots
2020-06-08T23:14:54.686404amanda2.illicoweb.com sshd\[16326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.62.174.233  user=root
2020-06-08T23:14:56.506827amanda2.illicoweb.com sshd\[16326\]: Failed password for root from 168.62.174.233 port 49594 ssh2
2020-06-08T23:18:21.080085amanda2.illicoweb.com sshd\[16746\]: Invalid user sorlag44 from 168.62.174.233 port 53100
2020-06-08T23:18:21.083329amanda2.illicoweb.com sshd\[16746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.62.174.233
2020-06-08T23:18:23.320372amanda2.illicoweb.com sshd\[16746\]: Failed password for invalid user sorlag44 from 168.62.174.233 port 53100 ssh2
...
2020-06-09 05:18:44
222.186.30.112 attackbots
2020-06-08T21:03:29.872808randservbullet-proofcloud-66.localdomain sshd[22083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
2020-06-08T21:03:31.989968randservbullet-proofcloud-66.localdomain sshd[22083]: Failed password for root from 222.186.30.112 port 64094 ssh2
2020-06-08T21:03:34.049280randservbullet-proofcloud-66.localdomain sshd[22083]: Failed password for root from 222.186.30.112 port 64094 ssh2
2020-06-08T21:03:29.872808randservbullet-proofcloud-66.localdomain sshd[22083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
2020-06-08T21:03:31.989968randservbullet-proofcloud-66.localdomain sshd[22083]: Failed password for root from 222.186.30.112 port 64094 ssh2
2020-06-08T21:03:34.049280randservbullet-proofcloud-66.localdomain sshd[22083]: Failed password for root from 222.186.30.112 port 64094 ssh2
...
2020-06-09 05:11:57
106.13.186.119 attack
2020-06-09T00:09:42.907333lavrinenko.info sshd[31784]: Invalid user mvasgw from 106.13.186.119 port 53882
2020-06-09T00:09:44.904326lavrinenko.info sshd[31784]: Failed password for invalid user mvasgw from 106.13.186.119 port 53882 ssh2
2020-06-09T00:12:47.505053lavrinenko.info sshd[31896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.186.119  user=root
2020-06-09T00:12:49.556604lavrinenko.info sshd[31896]: Failed password for root from 106.13.186.119 port 44728 ssh2
2020-06-09T00:15:58.032338lavrinenko.info sshd[32059]: Invalid user www-data from 106.13.186.119 port 35558
...
2020-06-09 05:19:37
194.26.29.53 attackspam
Jun  8 23:13:06 debian-2gb-nbg1-2 kernel: \[13909524.260367\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.53 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=11872 PROTO=TCP SPT=48650 DPT=3349 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-09 05:18:30
203.99.62.158 attack
Jun  8 22:13:41 h2646465 sshd[16426]: Invalid user divyam from 203.99.62.158
Jun  8 22:13:41 h2646465 sshd[16426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.99.62.158
Jun  8 22:13:41 h2646465 sshd[16426]: Invalid user divyam from 203.99.62.158
Jun  8 22:13:43 h2646465 sshd[16426]: Failed password for invalid user divyam from 203.99.62.158 port 24813 ssh2
Jun  8 22:28:12 h2646465 sshd[17204]: Invalid user admin from 203.99.62.158
Jun  8 22:28:12 h2646465 sshd[17204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.99.62.158
Jun  8 22:28:12 h2646465 sshd[17204]: Invalid user admin from 203.99.62.158
Jun  8 22:28:13 h2646465 sshd[17204]: Failed password for invalid user admin from 203.99.62.158 port 52316 ssh2
Jun  8 22:31:54 h2646465 sshd[17494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.99.62.158  user=root
Jun  8 22:31:56 h2646465 sshd[17494]: Failed password for root
2020-06-09 05:42:05
144.217.46.42 attackspam
Lines containing failures of 144.217.46.42
Jun  8 05:13:30 icinga sshd[11043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.46.42  user=r.r
Jun  8 05:13:33 icinga sshd[11043]: Failed password for r.r from 144.217.46.42 port 57350 ssh2
Jun  8 05:13:33 icinga sshd[11043]: Received disconnect from 144.217.46.42 port 57350:11: Bye Bye [preauth]
Jun  8 05:13:33 icinga sshd[11043]: Disconnected from authenticating user r.r 144.217.46.42 port 57350 [preauth]
Jun  8 05:25:41 icinga sshd[14685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.46.42  user=r.r
Jun  8 05:25:42 icinga sshd[14685]: Failed password for r.r from 144.217.46.42 port 44916 ssh2
Jun  8 05:25:43 icinga sshd[14685]: Received disconnect from 144.217.46.42 port 44916:11: Bye Bye [preauth]
Jun  8 05:25:43 icinga sshd[14685]: Disconnected from authenticating user r.r 144.217.46.42 port 44916 [preauth]
Jun  8 05:31:2........
------------------------------
2020-06-09 05:09:20
122.14.228.229 attackspambots
Failed password for invalid user ian from 122.14.228.229 port 42926 ssh2
2020-06-09 05:28:30
168.90.209.137 attackbotsspam
Automatic report - Port Scan Attack
2020-06-09 05:24:18
188.131.179.87 attackbotsspam
Jun  8 22:28:28 lnxmysql61 sshd[30349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.179.87
Jun  8 22:28:30 lnxmysql61 sshd[30349]: Failed password for invalid user admin from 188.131.179.87 port 28400 ssh2
Jun  8 22:38:21 lnxmysql61 sshd[994]: Failed password for root from 188.131.179.87 port 14954 ssh2
2020-06-09 05:05:00
51.89.136.104 attack
Jun  8 21:04:07 game-panel sshd[4235]: Failed password for root from 51.89.136.104 port 60370 ssh2
Jun  8 21:09:14 game-panel sshd[4586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.136.104
Jun  8 21:09:16 game-panel sshd[4586]: Failed password for invalid user admin from 51.89.136.104 port 35506 ssh2
2020-06-09 05:20:08
121.241.244.92 attack
2020-06-08T20:16:11.997588abusebot-4.cloudsearch.cf sshd[20785]: Invalid user kzl from 121.241.244.92 port 58062
2020-06-08T20:16:12.005077abusebot-4.cloudsearch.cf sshd[20785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.244.92
2020-06-08T20:16:11.997588abusebot-4.cloudsearch.cf sshd[20785]: Invalid user kzl from 121.241.244.92 port 58062
2020-06-08T20:16:14.317677abusebot-4.cloudsearch.cf sshd[20785]: Failed password for invalid user kzl from 121.241.244.92 port 58062 ssh2
2020-06-08T20:21:04.567482abusebot-4.cloudsearch.cf sshd[21029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.244.92  user=root
2020-06-08T20:21:05.966770abusebot-4.cloudsearch.cf sshd[21029]: Failed password for root from 121.241.244.92 port 53306 ssh2
2020-06-08T20:25:54.463769abusebot-4.cloudsearch.cf sshd[21311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.24
...
2020-06-09 05:09:42
103.147.10.222 attackspam
103.147.10.222 - - \[08/Jun/2020:22:25:08 +0200\] "POST /wp-login.php HTTP/1.0" 200 6718 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.147.10.222 - - \[08/Jun/2020:22:25:24 +0200\] "POST /wp-login.php HTTP/1.0" 200 6548 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.147.10.222 - - \[08/Jun/2020:22:25:40 +0200\] "POST /wp-login.php HTTP/1.0" 200 6542 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-06-09 05:25:50

Recently Reported IPs

194.49.205.90 194.49.52.73 194.47.110.17 47.76.152.202
194.5.156.10 194.5.111.111 194.5.156.18 194.49.71.110
194.5.156.100 194.5.156.50 194.49.61.130 194.5.156.3
194.5.156.115 194.5.156.14 194.5.156.71 194.5.156.55
194.5.156.90 194.5.156.66 194.5.156.56 194.5.156.8