Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.245.244.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39886
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;195.245.244.49.			IN	A

;; AUTHORITY SECTION:
.			492	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 03:10:41 CST 2022
;; MSG SIZE  rcvd: 107
Host info
49.244.245.195.in-addr.arpa domain name pointer 72-29.pppoe-nat.sh2.natanet.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.244.245.195.in-addr.arpa	name = 72-29.pppoe-nat.sh2.natanet.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
210.120.63.89 attackspambots
Sep  3 06:17:14 SilenceServices sshd[16979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.120.63.89
Sep  3 06:17:16 SilenceServices sshd[16979]: Failed password for invalid user esbuser from 210.120.63.89 port 59917 ssh2
Sep  3 06:22:09 SilenceServices sshd[18865]: Failed password for root from 210.120.63.89 port 53715 ssh2
2019-09-03 12:45:29
106.13.63.41 attackbotsspam
Sep  3 03:00:51 legacy sshd[28267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.63.41
Sep  3 03:00:53 legacy sshd[28267]: Failed password for invalid user simple from 106.13.63.41 port 47390 ssh2
Sep  3 03:02:26 legacy sshd[28299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.63.41
...
2019-09-03 12:48:08
144.217.83.201 attackbotsspam
Sep  3 03:41:04 SilenceServices sshd[5949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.83.201
Sep  3 03:41:06 SilenceServices sshd[5949]: Failed password for invalid user ftpuser1 from 144.217.83.201 port 59758 ssh2
Sep  3 03:44:55 SilenceServices sshd[8842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.83.201
2019-09-03 13:05:44
210.209.72.243 attackspambots
Sep  3 06:24:37 lnxweb61 sshd[29670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.209.72.243
2019-09-03 12:30:39
178.66.182.127 attack
Unauthorized connection attempt from IP address 178.66.182.127 on Port 445(SMB)
2019-09-03 12:58:45
43.254.220.13 attackbotsspam
Unauthorised access (Sep  3) SRC=43.254.220.13 LEN=40 TOS=0x10 PREC=0x40 TTL=239 ID=24407 TCP DPT=445 WINDOW=1024 SYN
2019-09-03 12:30:23
178.176.105.82 attackbotsspam
Sep  3 01:51:14 lnxweb61 sshd[24289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.176.105.82
Sep  3 01:51:14 lnxweb61 sshd[24289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.176.105.82
2019-09-03 12:38:46
119.27.162.90 attack
Sep  3 07:03:48 dedicated sshd[21967]: Invalid user murilo from 119.27.162.90 port 36130
2019-09-03 13:11:12
80.234.44.81 attack
Sep  3 05:49:51 www1 sshd\[33947\]: Invalid user pv from 80.234.44.81Sep  3 05:49:53 www1 sshd\[33947\]: Failed password for invalid user pv from 80.234.44.81 port 56792 ssh2Sep  3 05:53:52 www1 sshd\[34459\]: Invalid user tests from 80.234.44.81Sep  3 05:53:54 www1 sshd\[34459\]: Failed password for invalid user tests from 80.234.44.81 port 40184 ssh2Sep  3 05:57:35 www1 sshd\[34962\]: Invalid user sample from 80.234.44.81Sep  3 05:57:37 www1 sshd\[34962\]: Failed password for invalid user sample from 80.234.44.81 port 51852 ssh2
...
2019-09-03 13:04:21
211.159.174.127 attackbots
SSH Brute Force, server-1 sshd[31430]: Failed password for invalid user peter from 211.159.174.127 port 41304 ssh2
2019-09-03 13:18:12
218.98.26.170 attackspam
2019-09-02T20:00:07.806515Z \[cowrie.ssh.factory.CowrieSSHFactory\] New connection: 218.98.26.170:40781 \(107.175.91.48:22\) \[session: dfe7d41de112\]
2019-09-03T05:09:35.637796Z \[cowrie.ssh.factory.CowrieSSHFactory\] New connection: 218.98.26.170:55690 \(107.175.91.48:22\) \[session: 8099b3d4708a\]
...
2019-09-03 13:12:55
122.166.169.26 attackbots
Sep  3 07:47:36 www2 sshd\[53499\]: Invalid user takashi from 122.166.169.26Sep  3 07:47:37 www2 sshd\[53499\]: Failed password for invalid user takashi from 122.166.169.26 port 56922 ssh2Sep  3 07:53:41 www2 sshd\[54090\]: Invalid user aaa from 122.166.169.26
...
2019-09-03 12:57:06
185.175.93.18 attackspambots
09/03/2019-00:18:52.604866 185.175.93.18 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-03 13:01:52
118.69.32.195 attackspam
Unauthorised access (Sep  3) SRC=118.69.32.195 LEN=52 TTL=110 ID=19867 DF TCP DPT=445 WINDOW=8192 SYN
2019-09-03 12:32:50
219.153.31.186 attackspambots
Sep  3 03:42:08 markkoudstaal sshd[27374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.153.31.186
Sep  3 03:42:10 markkoudstaal sshd[27374]: Failed password for invalid user silvio from 219.153.31.186 port 16668 ssh2
Sep  3 03:46:34 markkoudstaal sshd[27780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.153.31.186
2019-09-03 12:33:22

Recently Reported IPs

64.227.6.0 116.179.37.58 41.36.218.121 196.127.27.252
41.106.162.123 59.18.162.14 179.43.187.37 154.202.124.166
41.43.227.140 58.44.182.190 41.42.88.102 177.129.253.176
191.54.62.130 61.54.63.161 182.114.34.248 152.39.238.142
143.0.219.216 154.127.116.46 110.169.175.113 199.247.27.41