Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Seongnam-si

Region: Gyeonggi-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.22.205.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2508
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.22.205.39.			IN	A

;; AUTHORITY SECTION:
.			455	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060100 1800 900 604800 86400

;; Query time: 90 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 01 13:48:47 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 39.205.22.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 39.205.22.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
78.164.147.229 attack
20/5/22@07:48:32: FAIL: Alarm-Network address from=78.164.147.229
20/5/22@07:48:32: FAIL: Alarm-Network address from=78.164.147.229
...
2020-05-23 03:04:10
114.119.162.125 attackbotsspam
Automatic report - Banned IP Access
2020-05-23 02:33:31
106.13.93.60 attack
May 22 19:27:11 cdc sshd[2350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.93.60 
May 22 19:27:13 cdc sshd[2350]: Failed password for invalid user lks from 106.13.93.60 port 56154 ssh2
2020-05-23 03:00:33
106.12.12.84 attackbots
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-05-23 03:04:41
212.64.19.237 attackspambots
(sshd) Failed SSH login from 212.64.19.237 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: May 22 13:05:02 host sshd[11655]: Invalid user yangf from 212.64.19.237 port 33322
2020-05-23 02:32:57
92.38.136.69 attackspam
Disguised contact form SPAM BOT (403)
2020-05-23 02:45:28
117.50.44.115 attackspam
web-1 [ssh] SSH Attack
2020-05-23 03:05:42
114.37.68.169 attackbotsspam
Port probing on unauthorized port 2323
2020-05-23 02:45:11
176.31.251.177 attackspambots
May 22 14:52:09 vps46666688 sshd[27571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.251.177
May 22 14:52:11 vps46666688 sshd[27571]: Failed password for invalid user xbs from 176.31.251.177 port 49268 ssh2
...
2020-05-23 03:01:27
195.54.166.97 attackspambots
firewall-block, port(s): 3388/tcp
2020-05-23 02:52:22
202.107.188.12 attackspambots
Triggered: repeated knocking on closed ports.
2020-05-23 02:31:20
42.200.244.178 attack
prod8
...
2020-05-23 02:53:25
138.197.69.184 attack
SSH Login Bruteforce
2020-05-23 02:55:54
119.254.12.66 attackbotsspam
Invalid user evz from 119.254.12.66 port 34640
2020-05-23 03:05:30
85.110.63.253 attack
SMB Server BruteForce Attack
2020-05-23 02:29:53

Recently Reported IPs

113.21.116.82 216.95.11.161 111.250.92.95 106.5.174.238
49.99.221.221 142.9.99.244 103.209.87.226 67.44.202.172
66.196.194.191 206.170.234.242 4.249.209.125 75.153.245.17
59.57.2.105 184.65.100.3 37.199.230.229 50.60.251.31
93.120.133.103 57.4.16.214 166.32.212.38 49.89.255.21