Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Alytus

Region: Alytus

Country: Republic of Lithuania

Internet Service Provider: unknown

Hostname: unknown

Organization: UAB Cgates

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.20.58.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27865
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.20.58.249.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed Apr 10 19:37:37 +08 2019
;; MSG SIZE  rcvd: 115

Host info
249.58.20.5.in-addr.arpa domain name pointer data-58-249.cgates.lt.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
249.58.20.5.in-addr.arpa	name = data-58-249.cgates.lt.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
91.226.22.148 attackbotsspam
May 21 21:35:20 electroncash sshd[17256]: Invalid user qxq from 91.226.22.148 port 42880
May 21 21:35:20 electroncash sshd[17256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.226.22.148 
May 21 21:35:20 electroncash sshd[17256]: Invalid user qxq from 91.226.22.148 port 42880
May 21 21:35:22 electroncash sshd[17256]: Failed password for invalid user qxq from 91.226.22.148 port 42880 ssh2
May 21 21:38:53 electroncash sshd[18166]: Invalid user mtg from 91.226.22.148 port 49106
...
2020-05-22 04:13:15
123.31.27.102 attackbotsspam
Invalid user yhw from 123.31.27.102 port 49444
2020-05-22 04:02:05
163.172.113.19 attack
May 21 19:19:53 l02a sshd[23647]: Invalid user uyl from 163.172.113.19
May 21 19:19:53 l02a sshd[23647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.113.19 
May 21 19:19:53 l02a sshd[23647]: Invalid user uyl from 163.172.113.19
May 21 19:19:55 l02a sshd[23647]: Failed password for invalid user uyl from 163.172.113.19 port 39764 ssh2
2020-05-22 04:28:37
51.255.173.70 attackbotsspam
Invalid user ujo from 51.255.173.70 port 56140
2020-05-22 04:16:12
222.186.42.7 attackspambots
Automatic report BANNED IP
2020-05-22 04:32:42
85.228.147.109 attack
Invalid user osmc from 85.228.147.109 port 48971
2020-05-22 04:13:42
203.148.20.254 attack
May 21 10:28:33 Host-KLAX-C sshd[13745]: Disconnected from invalid user mvl 203.148.20.254 port 56280 [preauth]
...
2020-05-22 03:54:11
116.72.47.169 attackspambots
Invalid user support from 116.72.47.169 port 57099
2020-05-22 04:06:16
218.75.211.14 attackbots
May 21 18:27:57 cloud sshd[14816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.75.211.14 
May 21 18:27:59 cloud sshd[14816]: Failed password for invalid user pzy from 218.75.211.14 port 43428 ssh2
2020-05-22 04:22:07
81.200.30.151 attack
Invalid user fnh from 81.200.30.151 port 50628
2020-05-22 04:14:59
198.199.115.94 attack
21218/tcp 2590/tcp 1052/tcp...
[2020-03-29/05-21]97pkt,34pt.(tcp)
2020-05-22 04:23:51
181.168.58.85 attackbotsspam
Port probing on unauthorized port 22
2020-05-22 04:26:20
118.25.91.168 attackbotsspam
SSH Brute-Forcing (server2)
2020-05-22 04:04:39
106.13.174.144 attack
"fail2ban match"
2020-05-22 04:10:37
85.132.107.118 attackbotsspam
Invalid user user from 85.132.107.118 port 62534
2020-05-22 04:14:05

Recently Reported IPs

113.188.133.148 67.245.146.49 182.180.109.201 190.83.244.181
78.192.152.223 173.249.7.76 189.80.131.218 90.165.237.203
115.50.152.163 197.50.75.185 103.206.119.222 142.93.108.165
41.242.18.1 181.57.161.83 197.210.52.165 103.115.180.184
207.46.13.58 151.236.39.29 183.22.253.117 125.230.224.200