Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Nepal

Internet Service Provider: Ncell

Hostname: unknown

Organization: Ncell Pvt. Ltd.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.126.90.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8957
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.126.90.14.			IN	A

;; AUTHORITY SECTION:
.			2412	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070401 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jul 05 02:58:21 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 14.90.126.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 14.90.126.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.141.208.166 attack
Oct 24 19:30:09 lnxmysql61 sshd[5118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.141.208.166
Oct 24 19:30:09 lnxmysql61 sshd[5121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.141.208.166
Oct 24 19:30:11 lnxmysql61 sshd[5118]: Failed password for invalid user pi from 118.141.208.166 port 60418 ssh2
Oct 24 19:30:11 lnxmysql61 sshd[5121]: Failed password for invalid user pi from 118.141.208.166 port 60420 ssh2
2019-10-25 03:58:27
202.29.39.1 attackbots
Invalid user zimbra from 202.29.39.1 port 42748
2019-10-25 03:46:11
144.217.214.25 attack
Oct 24 16:15:05 work-partkepr sshd\[31980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.214.25  user=root
Oct 24 16:15:07 work-partkepr sshd\[31980\]: Failed password for root from 144.217.214.25 port 58698 ssh2
...
2019-10-25 03:56:25
130.211.246.128 attackspambots
Invalid user oracle from 130.211.246.128 port 37824
2019-10-25 03:57:25
67.205.154.53 attack
Invalid user ttt from 67.205.154.53 port 52534
2019-10-25 04:08:10
178.122.84.19 attackspam
Invalid user admin from 178.122.84.19 port 44418
2019-10-25 03:53:28
198.199.107.41 attack
Invalid user ftpuser from 198.199.107.41 port 35549
2019-10-25 03:48:28
154.120.242.70 attackbotsspam
Invalid user support from 154.120.242.70 port 58426
2019-10-25 03:55:28
35.163.88.197 attackbotsspam
Invalid user usuario from 35.163.88.197 port 53604
2019-10-25 04:14:04
104.244.77.219 attackspam
Invalid user fake from 104.244.77.219 port 49494
2019-10-25 04:03:05
61.172.238.14 attackbots
web-1 [ssh] SSH Attack
2019-10-25 04:09:22
60.113.85.41 attackspam
Invalid user rasa from 60.113.85.41 port 40742
2019-10-25 04:09:55
108.222.68.232 attackspam
Invalid user kshaheen from 108.222.68.232 port 45630
2019-10-25 04:01:01
59.172.61.158 attackspam
Oct 24 17:21:46 VM-53c21161-1059-419a-8c46-6835f32d2b41 sshd[16233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.172.61.158
Oct 24 17:21:49 VM-53c21161-1059-419a-8c46-6835f32d2b41 sshd[16233]: Failed password for invalid user zimbra from 59.172.61.158 port 38800 ssh2
Oct 24 17:28:13 VM-53c21161-1059-419a-8c46-6835f32d2b41 sshd[16247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.172.61.158
...
2019-10-25 04:10:24
200.87.138.178 attackbots
Invalid user eric from 200.87.138.178 port 30272
2019-10-25 03:46:32

Recently Reported IPs

27.199.236.182 204.127.161.40 84.106.129.146 23.68.133.183
37.151.174.154 18.82.96.229 206.146.233.135 200.18.168.146
151.40.190.217 129.59.53.216 169.197.97.34 234.30.202.159
170.129.86.78 51.237.90.133 119.104.110.130 58.233.92.131
68.190.64.18 195.57.133.224 29.183.144.117 62.31.153.105