Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Utase

Region: Tiba (Chiba)

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.248.49.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28079
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;221.248.49.39.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 14:58:39 CST 2025
;; MSG SIZE  rcvd: 106
Host info
39.49.248.221.in-addr.arpa domain name pointer 221x248x49x39.ap221.ftth.ucom.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
39.49.248.221.in-addr.arpa	name = 221x248x49x39.ap221.ftth.ucom.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
27.109.17.18 attack
Aug 15 21:36:06 www sshd\[29120\]: Invalid user zini from 27.109.17.18 port 51396
...
2019-08-16 03:56:03
182.171.245.130 attackspam
SSH invalid-user multiple login try
2019-08-16 03:56:59
202.70.80.27 attackspambots
Aug 15 08:01:50 php1 sshd\[26943\]: Invalid user diego from 202.70.80.27
Aug 15 08:01:50 php1 sshd\[26943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.70.80.27
Aug 15 08:01:52 php1 sshd\[26943\]: Failed password for invalid user diego from 202.70.80.27 port 46928 ssh2
Aug 15 08:08:01 php1 sshd\[28044\]: Invalid user www from 202.70.80.27
Aug 15 08:08:01 php1 sshd\[28044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.70.80.27
2019-08-16 03:33:27
182.61.170.213 attack
SSH Brute-Force reported by Fail2Ban
2019-08-16 04:04:14
185.220.101.65 attack
Aug 15 20:56:30 lnxded63 sshd[5153]: Failed password for root from 185.220.101.65 port 43425 ssh2
Aug 15 20:56:33 lnxded63 sshd[5153]: Failed password for root from 185.220.101.65 port 43425 ssh2
Aug 15 20:56:36 lnxded63 sshd[5153]: Failed password for root from 185.220.101.65 port 43425 ssh2
Aug 15 20:56:39 lnxded63 sshd[5153]: Failed password for root from 185.220.101.65 port 43425 ssh2
2019-08-16 03:32:20
84.197.6.237 attackspambots
Aug 15 12:05:59 master sshd[5673]: Failed password for invalid user admin from 84.197.6.237 port 52714 ssh2
Aug 15 12:06:01 master sshd[5673]: Failed password for invalid user admin from 84.197.6.237 port 52714 ssh2
Aug 15 12:06:04 master sshd[5673]: Failed password for invalid user admin from 84.197.6.237 port 52714 ssh2
2019-08-16 04:09:14
189.76.84.254 attackbots
scan z
2019-08-16 03:48:46
173.73.100.52 attack
Multiple failed RDP login attempts
2019-08-16 04:09:37
222.186.15.197 attack
Aug 15 21:40:41 legacy sshd[20340]: Failed password for root from 222.186.15.197 port 14572 ssh2
Aug 15 21:40:49 legacy sshd[20343]: Failed password for root from 222.186.15.197 port 23692 ssh2
...
2019-08-16 03:44:20
13.65.151.171 attack
Invalid user ang from 13.65.151.171 port 57020
2019-08-16 03:35:47
119.252.174.195 attack
Aug 15 11:08:03 plusreed sshd[5760]: Invalid user sun from 119.252.174.195
...
2019-08-16 03:41:04
45.169.110.199 attack
Aug 15 14:37:01 mailman sshd[5489]: Invalid user pi from 45.169.110.199
Aug 15 14:37:01 mailman sshd[5488]: Invalid user pi from 45.169.110.199
Aug 15 14:37:01 mailman sshd[5489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.169.110.199
2019-08-16 03:53:16
122.199.152.157 attack
Aug 15 17:19:55 cvbmail sshd\[9531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.199.152.157  user=mysql
Aug 15 17:19:57 cvbmail sshd\[9531\]: Failed password for mysql from 122.199.152.157 port 22874 ssh2
Aug 15 17:26:59 cvbmail sshd\[9564\]: Invalid user vagrant from 122.199.152.157
2019-08-16 03:54:48
46.101.76.236 attack
Automatic report - Banned IP Access
2019-08-16 03:55:43
123.206.25.245 attackspam
Aug 15 04:03:32 kapalua sshd\[16954\]: Invalid user kadewe from 123.206.25.245
Aug 15 04:03:32 kapalua sshd\[16954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.25.245
Aug 15 04:03:34 kapalua sshd\[16954\]: Failed password for invalid user kadewe from 123.206.25.245 port 39350 ssh2
Aug 15 04:08:07 kapalua sshd\[17412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.25.245  user=root
Aug 15 04:08:09 kapalua sshd\[17412\]: Failed password for root from 123.206.25.245 port 44100 ssh2
2019-08-16 04:06:14

Recently Reported IPs

237.124.236.48 79.243.48.96 127.218.34.164 31.206.115.61
16.239.115.93 99.49.111.109 210.121.204.145 192.152.119.38
58.17.175.131 101.40.125.96 35.176.242.215 233.254.194.219
48.81.47.73 253.77.254.127 54.233.239.87 182.169.111.96
152.181.227.124 144.222.92.167 178.10.241.10 22.218.87.110