Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hanam-si

Region: Gyeonggi-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: LG POWERCOMM

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.166.44.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56852
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.166.44.21.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072201 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jul 23 02:10:06 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 21.44.166.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 21.44.166.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
120.133.136.75 attack
SSH Brute-Forcing (server1)
2020-08-23 02:59:05
95.81.218.30 attackbots
 TCP (SYN) 95.81.218.30:63336 -> port 1080, len 52
2020-08-23 02:34:33
189.8.95.30 attackspam
Failed password for invalid user kevin from 189.8.95.30 port 61064 ssh2
2020-08-23 02:36:39
221.138.59.165 attack
SSH login attempts.
2020-08-23 02:49:13
103.84.237.74 attack
bruteforce detected
2020-08-23 02:46:09
220.143.76.148 attack
SSH login attempts.
2020-08-23 03:07:40
223.16.28.102 attack
SSH login attempts.
2020-08-23 02:31:10
202.21.127.189 attack
Aug 22 15:27:48 eventyay sshd[24129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.21.127.189
Aug 22 15:27:50 eventyay sshd[24129]: Failed password for invalid user user2 from 202.21.127.189 port 43554 ssh2
Aug 22 15:32:06 eventyay sshd[24267]: Failed password for root from 202.21.127.189 port 52046 ssh2
...
2020-08-23 03:05:25
87.251.73.238 attackspam
 TCP (SYN) 87.251.73.238:48464 -> port 33959, len 44
2020-08-23 02:31:40
5.9.66.153 attackbots
abuseConfidenceScore blocked for 12h
2020-08-23 02:38:33
220.84.73.190 attack
SSH login attempts.
2020-08-23 02:55:57
192.241.154.168 attackbotsspam
Aug 22 20:45:26 ip106 sshd[20913]: Failed password for root from 192.241.154.168 port 56860 ssh2
Aug 22 20:49:21 ip106 sshd[21151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.154.168 
...
2020-08-23 03:01:09
103.221.252.46 attack
SSH Brute-Forcing (server1)
2020-08-23 02:42:33
213.154.45.95 attackbotsspam
Invalid user w from 213.154.45.95 port 47913
2020-08-23 02:44:48
51.75.255.250 attack
SSH Brute-Forcing (server2)
2020-08-23 02:58:04

Recently Reported IPs

72.78.121.57 117.23.178.90 84.39.65.144 40.144.199.25
59.25.197.138 210.190.78.19 18.188.107.204 9.25.236.69
176.38.158.48 246.56.107.24 211.37.156.143 103.81.100.225
209.237.87.172 208.25.157.115 119.196.130.106 113.198.0.140
74.153.134.109 65.39.133.21 210.3.61.166 220.48.72.29