Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.217.252.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42683
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.217.252.130.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 05:07:23 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 130.252.217.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 130.252.217.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.22.202 attackbotsspam
2020-07-31 14:04:48,199 fail2ban.actions: WARNING [ssh-ddos] Ban 106.12.22.202
2020-08-01 01:18:29
80.82.64.124 attackspam
Invalid user gns3 from 80.82.64.124 port 51707
2020-08-01 01:40:29
180.101.248.148 attackspam
Brute-force attempt banned
2020-08-01 01:14:23
116.108.184.30 attackbotsspam
Automatic report - Port Scan Attack
2020-08-01 01:29:36
45.6.18.65 attack
Jul 31 14:10:07 vps333114 sshd[32509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.18.65  user=root
Jul 31 14:10:09 vps333114 sshd[32509]: Failed password for root from 45.6.18.65 port 26140 ssh2
...
2020-08-01 01:21:54
210.22.98.24 attackspambots
Jul 31 04:54:02 host2 sshd[30865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.22.98.24  user=r.r
Jul 31 04:54:04 host2 sshd[30865]: Failed password for r.r from 210.22.98.24 port 14175 ssh2
Jul 31 04:54:04 host2 sshd[30865]: Received disconnect from 210.22.98.24: 11: Bye Bye [preauth]
Jul 31 04:56:58 host2 sshd[9382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.22.98.24  user=r.r
Jul 31 04:57:00 host2 sshd[9382]: Failed password for r.r from 210.22.98.24 port 11367 ssh2
Jul 31 04:57:00 host2 sshd[9382]: Received disconnect from 210.22.98.24: 11: Bye Bye [preauth]
Jul 31 04:59:53 host2 sshd[22677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.22.98.24  user=r.r
Jul 31 04:59:54 host2 sshd[22677]: Failed password for r.r from 210.22.98.24 port 57570 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=210.22.98.24
2020-08-01 01:05:00
162.209.73.209 attack
Jul 31 12:30:48 ns sshd[12574]: Connection from 162.209.73.209 port 35720 on 134.119.39.98 port 22
Jul 31 12:30:51 ns sshd[12574]: User r.r from 162.209.73.209 not allowed because not listed in AllowUsers
Jul 31 12:30:51 ns sshd[12574]: Failed password for invalid user r.r from 162.209.73.209 port 35720 ssh2
Jul 31 12:30:51 ns sshd[12574]: Received disconnect from 162.209.73.209 port 35720:11: Bye Bye [preauth]
Jul 31 12:30:51 ns sshd[12574]: Disconnected from 162.209.73.209 port 35720 [preauth]
Jul 31 12:41:34 ns sshd[18553]: Connection from 162.209.73.209 port 33548 on 134.119.39.98 port 22
Jul 31 12:41:41 ns sshd[18553]: User r.r from 162.209.73.209 not allowed because not listed in AllowUsers
Jul 31 12:41:41 ns sshd[18553]: Failed password for invalid user r.r from 162.209.73.209 port 33548 ssh2
Jul 31 12:41:41 ns sshd[18553]: Received disconnect from 162.209.73.209 port 33548:11: Bye Bye [preauth]
Jul 31 12:41:41 ns sshd[18553]: Disconnected from 162.209.73.209 por........
-------------------------------
2020-08-01 01:30:34
122.114.183.18 attack
Jul 31 16:54:25 vps sshd[7321]: Failed password for root from 122.114.183.18 port 53374 ssh2
Jul 31 17:03:45 vps sshd[7852]: Failed password for root from 122.114.183.18 port 47108 ssh2
...
2020-08-01 01:11:52
54.88.109.220 attackspam
Scanner : /ResidentEvil/proxy
2020-08-01 01:23:55
212.129.6.47 attack
Attempt to log in with non-existing username: admin
2020-08-01 01:15:46
85.172.11.101 attackbotsspam
Jul 31 16:20:03 hosting sshd[21850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.172.11.101  user=root
Jul 31 16:20:05 hosting sshd[21850]: Failed password for root from 85.172.11.101 port 39436 ssh2
...
2020-08-01 01:41:06
51.161.70.113 attackspam
Jul 31 17:10:00 pornomens sshd\[32372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.161.70.113  user=root
Jul 31 17:10:02 pornomens sshd\[32372\]: Failed password for root from 51.161.70.113 port 44180 ssh2
Jul 31 17:14:47 pornomens sshd\[32484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.161.70.113  user=root
...
2020-08-01 01:27:05
114.69.249.194 attack
Jul 31 19:03:38 vpn01 sshd[20213]: Failed password for root from 114.69.249.194 port 36679 ssh2
...
2020-08-01 01:26:19
51.68.91.191 attackbots
Jul 31 18:07:54 rancher-0 sshd[687399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.91.191  user=root
Jul 31 18:07:56 rancher-0 sshd[687399]: Failed password for root from 51.68.91.191 port 41638 ssh2
...
2020-08-01 01:16:28
51.89.149.241 attack
Jul 31 07:14:15 server1 sshd\[2167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.149.241  user=root
Jul 31 07:14:17 server1 sshd\[2167\]: Failed password for root from 51.89.149.241 port 34724 ssh2
Jul 31 07:19:01 server1 sshd\[3263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.149.241  user=root
Jul 31 07:19:03 server1 sshd\[3263\]: Failed password for root from 51.89.149.241 port 45422 ssh2
Jul 31 07:23:44 server1 sshd\[4364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.149.241  user=root
...
2020-08-01 01:47:02

Recently Reported IPs

87.131.7.100 230.65.164.118 193.254.228.26 152.78.105.48
107.100.56.44 248.226.237.248 14.62.97.242 9.100.113.140
140.80.148.54 16.48.179.104 89.127.153.114 78.172.36.85
165.84.105.152 123.4.72.118 246.240.169.248 97.202.37.159
175.191.203.68 152.187.207.200 63.200.105.185 15.153.113.24