Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.212.49.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59795
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.212.49.195.			IN	A

;; AUTHORITY SECTION:
.			469	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023042601 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 27 02:07:55 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 195.49.212.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 195.49.212.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
179.216.176.168 attackspambots
Invalid user admin from 179.216.176.168 port 46853
2020-09-16 02:09:58
41.111.135.196 attack
Sep 14 20:05:01 mout sshd[23846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.111.135.196  user=root
Sep 14 20:05:03 mout sshd[23846]: Failed password for root from 41.111.135.196 port 58842 ssh2
2020-09-16 02:17:29
191.233.199.68 attackbotsspam
frenzy
2020-09-16 02:36:12
36.111.182.49 attackbots
Port Scan
...
2020-09-16 02:07:36
183.82.121.34 attack
Sep 15 17:28:06 XXXXXX sshd[57564]: Invalid user memcache from 183.82.121.34 port 43736
2020-09-16 02:06:09
77.48.47.102 attack
Sep 15 15:41:23 sshgateway sshd\[29509\]: Invalid user gei from 77.48.47.102
Sep 15 15:41:23 sshgateway sshd\[29509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=home.chita.cz
Sep 15 15:41:26 sshgateway sshd\[29509\]: Failed password for invalid user gei from 77.48.47.102 port 50122 ssh2
2020-09-16 02:30:17
104.238.116.152 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-09-16 02:01:20
161.35.73.66 attackspambots
prod6
...
2020-09-16 02:17:57
189.14.251.246 attack
Bruteforce detected by fail2ban
2020-09-16 02:19:07
68.79.60.45 attackspambots
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-09-16 02:31:06
45.122.223.198 attackspam
C2,WP GET /wp-login.php
2020-09-16 02:11:42
213.238.180.13 attackspambots
Automatic report - Banned IP Access
2020-09-16 02:09:27
49.36.143.131 attackspam
Port Scan: TCP/443
2020-09-16 02:13:03
211.20.26.61 attackbotsspam
Multiple SSH authentication failures from 211.20.26.61
2020-09-16 02:33:26
188.214.12.220 attack
trying to access non-authorized port
2020-09-16 02:32:01

Recently Reported IPs

20.120.33.177 193.42.244.76 48.240.219.229 193.42.244.85
53.3.166.184 113.153.242.117 66.190.155.235 242.244.82.32
88.148.32.248 60.14.251.198 44.222.224.198 253.53.5.122
8.155.222.22 157.210.227.60 4.117.146.17 94.242.233.136
9.5.234.57 46.10.148.131 196.210.82.224 147.114.133.17