Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: RTC Communications LLC

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.49.59.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15254
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;207.49.59.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030601 1800 900 604800 86400

;; Query time: 118 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 07 08:29:29 CST 2025
;; MSG SIZE  rcvd: 104
Host info
b'Host 1.59.49.207.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 207.49.59.1.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
5.80.158.52 attackbots
Hits on port :
2020-09-26 22:12:46
1.171.19.44 attackspambots
2020-05-23T07:55:56.026177suse-nuc sshd[13733]: Invalid user supervisor from 1.171.19.44 port 50081
...
2020-09-26 21:59:06
49.235.212.7 attackspam
(sshd) Failed SSH login from 49.235.212.7 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 26 00:58:44 idl1-dfw sshd[3708187]: Invalid user multimedia from 49.235.212.7 port 37987
Sep 26 00:58:46 idl1-dfw sshd[3708187]: Failed password for invalid user multimedia from 49.235.212.7 port 37987 ssh2
Sep 26 01:06:29 idl1-dfw sshd[3713987]: Invalid user server1 from 49.235.212.7 port 54112
Sep 26 01:06:31 idl1-dfw sshd[3713987]: Failed password for invalid user server1 from 49.235.212.7 port 54112 ssh2
Sep 26 01:10:54 idl1-dfw sshd[3716953]: Invalid user redmine from 49.235.212.7 port 42069
2020-09-26 22:14:19
89.216.99.251 attackspam
Invalid user userftp from 89.216.99.251 port 54366
2020-09-26 22:06:47
1.2.157.199 attackbots
2020-07-05T00:46:50.444354suse-nuc sshd[19629]: Invalid user admin from 1.2.157.199 port 48517
...
2020-09-26 21:38:32
129.28.163.90 attack
Sep 26 17:08:42 web1 sshd[21724]: Invalid user ftptest from 129.28.163.90 port 55378
Sep 26 17:08:42 web1 sshd[21724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.163.90
Sep 26 17:08:42 web1 sshd[21724]: Invalid user ftptest from 129.28.163.90 port 55378
Sep 26 17:08:44 web1 sshd[21724]: Failed password for invalid user ftptest from 129.28.163.90 port 55378 ssh2
Sep 26 17:24:51 web1 sshd[27113]: Invalid user zy from 129.28.163.90 port 41754
Sep 26 17:24:51 web1 sshd[27113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.163.90
Sep 26 17:24:51 web1 sshd[27113]: Invalid user zy from 129.28.163.90 port 41754
Sep 26 17:24:52 web1 sshd[27113]: Failed password for invalid user zy from 129.28.163.90 port 41754 ssh2
Sep 26 17:28:42 web1 sshd[28396]: Invalid user admin from 129.28.163.90 port 54116
...
2020-09-26 21:41:10
95.188.70.130 attack
2020-09-25 UTC: (15x) - administrator,alexis,debian,git,nina,odroid,oracle(2x),redis,root(2x),ts,vyatta,william,xh
2020-09-26 21:37:34
1.181.101.203 attackspam
2020-05-09T19:06:07.662655suse-nuc sshd[27242]: Invalid user admin from 1.181.101.203 port 31399
...
2020-09-26 21:49:27
52.251.55.166 attackspam
Sep 24 22:42:09 roki-contabo sshd\[3145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.251.55.166  user=root
Sep 24 22:42:11 roki-contabo sshd\[3145\]: Failed password for root from 52.251.55.166 port 15100 ssh2
Sep 25 04:03:32 roki-contabo sshd\[11481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.251.55.166  user=root
Sep 25 04:03:33 roki-contabo sshd\[11481\]: Failed password for root from 52.251.55.166 port 48817 ssh2
Sep 25 13:15:23 roki-contabo sshd\[18958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.251.55.166  user=root
...
2020-09-26 22:08:56
1.179.185.50 attackspambots
Sep 26 15:33:37 buvik sshd[31245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.185.50
Sep 26 15:33:39 buvik sshd[31245]: Failed password for invalid user admin from 1.179.185.50 port 50868 ssh2
Sep 26 15:38:07 buvik sshd[31904]: Invalid user user from 1.179.185.50
...
2020-09-26 21:53:42
157.230.243.163 attackspam
2020-09-26T05:39:23.670519-07:00 suse-nuc sshd[387]: Invalid user odoo from 157.230.243.163 port 57856
...
2020-09-26 21:53:55
49.12.118.79 attack
Amazon phisg.
Received:  from mx.steamfair.co.uk () by mx-ha.gmx.net (mxgmx016 ) with ESMTPS (Nemesis) id 1MvJ8l-1kRfbn0yv3-00rKiM for ; Thu, 24 Sep 2020 21:48:01 +0200
Tracking message source: 49.12.118.79:
Routing details for 49.12.118.79
Report routing for 49.12.118.79: abuse@hetzner.de
"From:  (Gluckwunsch! Exklusive Pramien uber 50 USD- uber Amazon Prime!)
 Gesendet: Donnerstag, 24. Septemb
 er 2020 um 21:48 Uhr"
2020-09-26 21:47:00
117.222.235.164 attack
Listed on    abuseat.org plus barracudaCentral and zen-spamhaus   / proto=6  .  srcport=59927  .  dstport=23  .     (3556)
2020-09-26 21:48:21
1.193.39.196 attackspam
2020-01-18T06:23:51.410356suse-nuc sshd[27897]: Invalid user facturacion from 1.193.39.196 port 58998
...
2020-09-26 21:46:29
218.92.0.158 attackspam
Sep 26 15:14:12 vm0 sshd[4649]: Failed password for root from 218.92.0.158 port 5311 ssh2
Sep 26 15:14:26 vm0 sshd[4649]: error: maximum authentication attempts exceeded for root from 218.92.0.158 port 5311 ssh2 [preauth]
...
2020-09-26 21:44:29

Recently Reported IPs

157.236.167.27 250.233.218.33 117.169.152.52 118.80.246.178
176.128.157.75 255.189.240.95 234.154.199.242 205.134.73.91
44.107.116.33 87.224.241.95 86.139.47.181 119.35.235.84
197.148.198.115 131.92.249.204 64.16.199.13 4.97.3.239
170.230.124.174 101.114.102.26 248.68.75.124 159.37.70.195