Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.20.97.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6841
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.20.97.157.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010501 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 06 02:52:37 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 157.97.20.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 157.97.20.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.38.186.182 attackspam
Sep 17 02:48:05 icinga sshd[1887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.182
Sep 17 02:48:08 icinga sshd[1887]: Failed password for invalid user zha from 51.38.186.182 port 34256 ssh2
...
2019-09-17 09:21:52
207.154.209.159 attack
Sep 16 21:15:15 localhost sshd\[23890\]: Invalid user m from 207.154.209.159 port 33640
Sep 16 21:15:15 localhost sshd\[23890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.209.159
Sep 16 21:15:17 localhost sshd\[23890\]: Failed password for invalid user m from 207.154.209.159 port 33640 ssh2
2019-09-17 09:05:18
185.32.231.84 attackspambots
Automatic report - Port Scan Attack
2019-09-17 09:26:10
188.226.159.101 attackbots
xmlrpc attack
2019-09-17 09:41:08
201.238.239.151 attack
Sep 16 22:30:36 sshgateway sshd\[11960\]: Invalid user michel from 201.238.239.151
Sep 16 22:30:36 sshgateway sshd\[11960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.238.239.151
Sep 16 22:30:38 sshgateway sshd\[11960\]: Failed password for invalid user michel from 201.238.239.151 port 41908 ssh2
2019-09-17 09:08:00
92.119.179.66 attack
SSH-bruteforce attempts
2019-09-17 09:23:30
167.71.140.118 attackspam
Sep 16 15:24:07 aiointranet sshd\[27745\]: Invalid user c from 167.71.140.118
Sep 16 15:24:07 aiointranet sshd\[27745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.140.118
Sep 16 15:24:09 aiointranet sshd\[27745\]: Failed password for invalid user c from 167.71.140.118 port 35576 ssh2
Sep 16 15:27:29 aiointranet sshd\[28017\]: Invalid user zabbix from 167.71.140.118
Sep 16 15:27:29 aiointranet sshd\[28017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.140.118
2019-09-17 09:41:38
14.161.16.62 attackspam
Sep 17 03:10:41 bouncer sshd\[23359\]: Invalid user richard from 14.161.16.62 port 42586
Sep 17 03:10:41 bouncer sshd\[23359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.16.62 
Sep 17 03:10:43 bouncer sshd\[23359\]: Failed password for invalid user richard from 14.161.16.62 port 42586 ssh2
...
2019-09-17 09:12:49
171.6.19.154 attack
Chat Spam
2019-09-17 09:38:42
66.74.20.189 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/66.74.20.189/ 
 US - 1H : (230)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN20001 
 
 IP : 66.74.20.189 
 
 CIDR : 66.74.0.0/18 
 
 PREFIX COUNT : 405 
 
 UNIQUE IP COUNT : 6693632 
 
 
 WYKRYTE ATAKI Z ASN20001 :  
  1H - 1 
  3H - 2 
  6H - 2 
 12H - 2 
 24H - 2 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-17 09:46:43
220.180.239.104 attackbots
Sep 17 03:26:59 dedicated sshd[29185]: Failed password for invalid user notused from 220.180.239.104 port 59225 ssh2
Sep 17 03:26:57 dedicated sshd[29185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.180.239.104
Sep 17 03:26:57 dedicated sshd[29185]: Invalid user notused from 220.180.239.104 port 59225
Sep 17 03:26:59 dedicated sshd[29185]: Failed password for invalid user notused from 220.180.239.104 port 59225 ssh2
Sep 17 03:32:07 dedicated sshd[29905]: Invalid user archiva from 220.180.239.104 port 17736
2019-09-17 09:37:27
52.213.85.54 attackbots
home warranty protection plan scam!
2019-09-17 09:23:49
159.89.38.26 attack
Sep 16 14:47:52 wbs sshd\[5141\]: Invalid user nopassword from 159.89.38.26
Sep 16 14:47:52 wbs sshd\[5141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.38.26
Sep 16 14:47:54 wbs sshd\[5141\]: Failed password for invalid user nopassword from 159.89.38.26 port 37000 ssh2
Sep 16 14:52:55 wbs sshd\[5580\]: Invalid user apisms from 159.89.38.26
Sep 16 14:52:55 wbs sshd\[5580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.38.26
2019-09-17 09:43:05
159.65.248.54 attackbotsspam
Sep 17 04:13:30 site3 sshd\[92801\]: Invalid user lakshmi from 159.65.248.54
Sep 17 04:13:30 site3 sshd\[92801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.248.54
Sep 17 04:13:32 site3 sshd\[92801\]: Failed password for invalid user lakshmi from 159.65.248.54 port 42588 ssh2
Sep 17 04:16:58 site3 sshd\[92874\]: Invalid user oracle from 159.65.248.54
Sep 17 04:16:58 site3 sshd\[92874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.248.54
...
2019-09-17 09:20:28
78.161.22.235 attackspam
Automatic report - Port Scan Attack
2019-09-17 09:11:54

Recently Reported IPs

56.116.88.119 218.169.243.23 7.178.183.42 121.93.243.168
157.206.58.129 119.183.252.158 127.253.198.137 116.22.126.158
103.138.109.154 113.94.114.25 123.17.156.158 232.5.198.110
75.67.179.211 9.22.182.215 172.190.66.78 132.240.141.36
172.241.120.50 197.180.137.177 126.214.57.140 44.252.57.96