Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.116.126.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54526
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.116.126.49.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 13:56:05 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 49.126.116.213.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.126.116.213.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.219.144.84 attackbotsspam
Invalid user janet from 91.219.144.84 port 36577
2020-01-04 04:19:17
36.225.161.20 attackbots
Unauthorised access (Jan  3) SRC=36.225.161.20 LEN=40 TTL=46 ID=22900 TCP DPT=23 WINDOW=6786 SYN
2020-01-04 03:53:19
178.127.18.121 attack
Invalid user admin from 178.127.18.121 port 50439
2020-01-04 04:09:04
218.76.65.100 attackbotsspam
Jan  3 12:02:55 ws24vmsma01 sshd[151859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.76.65.100
Jan  3 12:02:56 ws24vmsma01 sshd[151859]: Failed password for invalid user fhd from 218.76.65.100 port 3488 ssh2
...
2020-01-04 03:54:53
202.107.238.14 attackbotsspam
Invalid user guest from 202.107.238.14 port 42757
2020-01-04 04:03:19
112.85.42.180 attack
[ssh] SSH attack
2020-01-04 03:49:40
138.197.89.212 attackspam
Jan  3 15:12:17 main sshd[25310]: Failed password for invalid user oracle from 138.197.89.212 port 35452 ssh2
2020-01-04 04:11:38
120.71.146.45 attackbots
Jan  3 15:51:41 * sshd[3024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.71.146.45
Jan  3 15:51:43 * sshd[3024]: Failed password for invalid user cdvonline from 120.71.146.45 port 51767 ssh2
2020-01-04 03:58:39
123.207.153.52 attackbots
Automatic report - Banned IP Access
2020-01-04 04:12:54
117.199.46.221 attackbots
Invalid user ident from 117.199.46.221 port 45598
2020-01-04 04:14:55
118.201.138.94 attack
Jan  3 20:46:46 pkdns2 sshd\[50268\]: Invalid user marvin from 118.201.138.94Jan  3 20:46:47 pkdns2 sshd\[50268\]: Failed password for invalid user marvin from 118.201.138.94 port 53489 ssh2Jan  3 20:47:20 pkdns2 sshd\[50306\]: Invalid user friend from 118.201.138.94Jan  3 20:47:22 pkdns2 sshd\[50306\]: Failed password for invalid user friend from 118.201.138.94 port 54464 ssh2Jan  3 20:47:55 pkdns2 sshd\[50322\]: Invalid user aliza from 118.201.138.94Jan  3 20:47:57 pkdns2 sshd\[50322\]: Failed password for invalid user aliza from 118.201.138.94 port 55439 ssh2
...
2020-01-04 03:52:59
45.55.84.16 attack
Brute force SMTP login attempted.
...
2020-01-04 04:21:42
92.222.72.234 attackbots
Invalid user hearst from 92.222.72.234 port 40890
2020-01-04 04:18:33
106.13.45.131 attackbotsspam
Brute-force attempt banned
2020-01-04 03:52:14
182.71.108.154 attackbots
Invalid user melissa from 182.71.108.154 port 34718
2020-01-04 04:08:08

Recently Reported IPs

116.151.116.231 97.42.69.195 173.172.73.126 62.158.36.177
4.75.145.129 43.176.52.32 18.66.186.88 129.54.191.31
19.0.142.92 144.205.46.236 20.197.116.160 209.234.29.194
164.235.52.90 22.242.249.148 195.122.169.247 65.229.181.196
39.151.129.247 119.32.221.38 150.37.67.127 196.167.222.151