Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 246.16.49.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15298
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;246.16.49.7.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 01:18:52 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 7.49.16.246.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 7.49.16.246.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
87.117.54.94 attackspambots
Port probing on unauthorized port 445
2020-08-22 01:44:43
213.171.58.162 attackspambots
 TCP (SYN) 213.171.58.162:59105 -> port 445, len 40
2020-08-22 01:20:52
68.183.90.130 attackspambots
Aug 21 18:38:22 pornomens sshd\[23632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.90.130  user=root
Aug 21 18:38:24 pornomens sshd\[23632\]: Failed password for root from 68.183.90.130 port 60672 ssh2
Aug 21 18:54:20 pornomens sshd\[23832\]: Invalid user ftpuser from 68.183.90.130 port 47182
Aug 21 18:54:20 pornomens sshd\[23832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.90.130
...
2020-08-22 01:45:57
211.38.5.86 attack
Aug 21 03:48:24 host-itldc-nl sshd[7646]: User root from 211.38.5.86 not allowed because not listed in AllowUsers
Aug 21 04:04:18 host-itldc-nl sshd[35583]: User root from 211.38.5.86 not allowed because not listed in AllowUsers
Aug 21 14:03:03 host-itldc-nl sshd[61045]: Invalid user pi from 211.38.5.86 port 58516
...
2020-08-22 01:28:43
117.211.126.230 attack
Unauthorized SSH login attempts
2020-08-22 02:01:00
180.166.228.228 attackspam
Aug 21 16:12:17 vps639187 sshd\[23581\]: Invalid user demos from 180.166.228.228 port 45554
Aug 21 16:12:17 vps639187 sshd\[23581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.166.228.228
Aug 21 16:12:19 vps639187 sshd\[23581\]: Failed password for invalid user demos from 180.166.228.228 port 45554 ssh2
...
2020-08-22 01:52:58
14.161.30.0 attackspam
Unauthorized connection attempt from IP address 14.161.30.0 on Port 445(SMB)
2020-08-22 01:22:34
115.78.9.189 attackbots
Unauthorized connection attempt from IP address 115.78.9.189 on Port 445(SMB)
2020-08-22 01:42:38
168.194.83.18 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-08-22 01:39:22
64.139.73.170 attackbots
Aug 21 14:02:26 minden010 sshd[575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.139.73.170
Aug 21 14:02:26 minden010 sshd[578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.139.73.170
Aug 21 14:02:28 minden010 sshd[575]: Failed password for invalid user pi from 64.139.73.170 port 33662 ssh2
...
2020-08-22 01:43:37
202.165.207.108 attack
Unauthorized connection attempt from IP address 202.165.207.108 on Port 445(SMB)
2020-08-22 01:34:34
94.191.60.213 attackbots
2020-08-21T23:36:18.088562hostname sshd[40609]: Invalid user nfs from 94.191.60.213 port 34884
2020-08-21T23:36:20.024751hostname sshd[40609]: Failed password for invalid user nfs from 94.191.60.213 port 34884 ssh2
2020-08-21T23:39:51.514187hostname sshd[40986]: Invalid user test101 from 94.191.60.213 port 36124
...
2020-08-22 01:18:09
14.161.12.249 attackspam
Unauthorized connection attempt from IP address 14.161.12.249 on Port 445(SMB)
2020-08-22 01:44:11
222.186.180.147 attack
Aug 21 19:23:22 sd-69548 sshd[136309]: Unable to negotiate with 222.186.180.147 port 14742: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
Aug 21 19:50:28 sd-69548 sshd[138152]: Unable to negotiate with 222.186.180.147 port 9800: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
...
2020-08-22 01:54:35
187.189.11.49 attackspambots
2020-08-21T16:00:30.928744abusebot-3.cloudsearch.cf sshd[22407]: Invalid user tomcat from 187.189.11.49 port 51180
2020-08-21T16:00:30.935392abusebot-3.cloudsearch.cf sshd[22407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=fixed-187-189-11-49.totalplay.net
2020-08-21T16:00:30.928744abusebot-3.cloudsearch.cf sshd[22407]: Invalid user tomcat from 187.189.11.49 port 51180
2020-08-21T16:00:33.317586abusebot-3.cloudsearch.cf sshd[22407]: Failed password for invalid user tomcat from 187.189.11.49 port 51180 ssh2
2020-08-21T16:01:31.451876abusebot-3.cloudsearch.cf sshd[22424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=fixed-187-189-11-49.totalplay.net  user=root
2020-08-21T16:01:33.206457abusebot-3.cloudsearch.cf sshd[22424]: Failed password for root from 187.189.11.49 port 59922 ssh2
2020-08-21T16:01:56.686504abusebot-3.cloudsearch.cf sshd[22428]: pam_unix(sshd:auth): authentication failure; logname= u
...
2020-08-22 01:49:26

Recently Reported IPs

219.245.138.148 43.67.196.215 242.14.89.128 248.84.154.58
121.38.162.141 236.175.123.47 126.223.146.13 56.27.243.109
188.207.144.173 21.186.190.248 20.15.205.15 238.175.106.226
89.51.120.190 161.32.206.125 60.10.106.145 19.110.12.204
124.80.178.11 19.25.228.33 99.245.57.70 247.183.9.206