Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.245.254.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30980
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.245.254.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 20:13:41 CST 2025
;; MSG SIZE  rcvd: 106
Host info
20.254.245.49.in-addr.arpa domain name pointer 20.254.245.49.unknown.m1.com.sg.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.254.245.49.in-addr.arpa	name = 20.254.245.49.unknown.m1.com.sg.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
171.244.145.251 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 12-03-2020 03:55:09.
2020-03-12 13:38:38
185.176.27.250 attackbotsspam
03/12/2020-01:20:51.663965 185.176.27.250 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-12 13:32:55
104.250.34.72 attackspambots
Mar 12 05:10:13 ns41 sshd[18994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.34.72
Mar 12 05:10:13 ns41 sshd[18994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.34.72
2020-03-12 14:03:28
35.240.164.224 attack
$f2bV_matches
2020-03-12 13:44:41
106.12.2.223 attack
(sshd) Failed SSH login from 106.12.2.223 (CN/China/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 12 04:54:22 ubnt-55d23 sshd[26455]: Invalid user git from 106.12.2.223 port 43246
Mar 12 04:54:25 ubnt-55d23 sshd[26455]: Failed password for invalid user git from 106.12.2.223 port 43246 ssh2
2020-03-12 14:07:14
51.158.153.58 attackspambots
$f2bV_matches
2020-03-12 14:03:43
51.38.130.63 attack
Invalid user ttest from 51.38.130.63 port 45730
2020-03-12 14:09:23
180.153.90.197 attackspambots
Brute-force attempt banned
2020-03-12 13:54:42
103.84.93.32 attack
Mar 12 05:27:39 *** sshd[5055]: User root from 103.84.93.32 not allowed because not listed in AllowUsers
2020-03-12 13:50:12
163.172.103.164 attackbots
[portscan] Port scan
2020-03-12 14:02:55
122.155.223.58 attackspam
21 attempts against mh-ssh on cloud
2020-03-12 13:45:11
106.51.98.159 attackspam
Too many connections or unauthorized access detected from Arctic banned ip
2020-03-12 13:46:22
51.75.4.79 attack
$f2bV_matches
2020-03-12 13:38:52
124.108.21.100 attack
SSH bruteforce (Triggered fail2ban)
2020-03-12 13:55:32
106.13.86.199 attackbots
SSH bruteforce (Triggered fail2ban)
2020-03-12 14:04:12

Recently Reported IPs

108.13.51.12 114.42.130.11 177.232.16.181 30.96.149.7
12.204.80.169 66.254.120.16 243.146.119.201 26.20.5.203
223.216.20.240 46.4.9.187 93.251.93.148 72.145.80.147
132.32.98.209 192.45.125.87 211.86.35.35 225.5.77.15
222.225.247.229 139.222.179.60 225.56.249.158 173.63.53.212