Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.221.49.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26596
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;199.221.49.113.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 21:47:57 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 113.49.221.199.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 199.221.49.113.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
111.122.232.6 attackspambots
Port probing on unauthorized port 1433
2020-04-20 19:26:01
95.238.40.183 attack
Unauthorized connection attempt detected from IP address 95.238.40.183 to port 81
2020-04-20 19:21:43
185.129.62.62 attackspambots
Automatic report - Banned IP Access
2020-04-20 19:22:26
112.35.130.177 attack
Apr 20 12:56:18 srv01 sshd[4345]: Invalid user vbox from 112.35.130.177 port 50302
Apr 20 12:56:18 srv01 sshd[4345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.130.177
Apr 20 12:56:18 srv01 sshd[4345]: Invalid user vbox from 112.35.130.177 port 50302
Apr 20 12:56:20 srv01 sshd[4345]: Failed password for invalid user vbox from 112.35.130.177 port 50302 ssh2
Apr 20 13:00:51 srv01 sshd[4724]: Invalid user ubuntu from 112.35.130.177 port 43028
...
2020-04-20 19:27:48
202.107.227.42 attackbots
Apr 20 11:50:48 debian-2gb-nbg1-2 kernel: \[9635211.955493\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=202.107.227.42 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=49208 DPT=9999 WINDOW=65535 RES=0x00 SYN URGP=0
2020-04-20 19:35:09
161.35.97.190 attackspambots
Brute force SMTP login attempted.
...
2020-04-20 19:27:28
107.174.20.91 attack
(sshd) Failed SSH login from 107.174.20.91 (US/United States/New York/Buffalo/91-20-174-107.reverse-dns/[AS20278 Nexeon Technologies, Inc.]): 1 in the last 3600 secs
2020-04-20 19:54:17
181.48.225.126 attackbots
Brute-force attempt banned
2020-04-20 19:39:22
59.53.95.94 attack
Apr 20 12:43:47 prox sshd[6871]: Failed password for root from 59.53.95.94 port 46187 ssh2
Apr 20 12:51:22 prox sshd[27553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.53.95.94
2020-04-20 19:39:05
91.121.90.124 attack
2020-04-20T11:14:36.279266upcloud.m0sh1x2.com sshd[16951]: Invalid user testa from 91.121.90.124 port 52488
2020-04-20 19:31:10
103.21.143.161 attackbotsspam
Invalid user postgres from 103.21.143.161 port 53706
2020-04-20 20:01:52
198.187.31.220 attackbots
IP blocked
2020-04-20 19:26:56
51.104.5.99 attackbotsspam
Invalid user nagios from 51.104.5.99 port 48137
2020-04-20 20:02:12
213.136.81.25 attackspam
Apr 20 13:35:51 prod4 sshd\[21886\]: Failed password for root from 213.136.81.25 port 37678 ssh2
Apr 20 13:41:21 prod4 sshd\[24076\]: Failed password for root from 213.136.81.25 port 38882 ssh2
Apr 20 13:44:05 prod4 sshd\[24983\]: Failed password for root from 213.136.81.25 port 33342 ssh2
...
2020-04-20 19:45:33
45.33.80.76 attackspambots
Port 443 (HTTPS) access denied
2020-04-20 19:21:14

Recently Reported IPs

145.236.234.46 30.237.183.55 240.243.20.49 185.53.112.105
218.81.13.106 69.164.86.142 140.150.170.219 81.201.111.105
69.221.9.208 14.132.89.155 38.213.97.249 208.19.227.119
93.91.243.217 162.72.241.88 45.114.228.65 202.48.141.53
155.176.207.119 145.179.12.61 229.216.135.29 56.224.137.76