Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
65.49.1.86 attack
Malicious IP
2025-01-23 13:47:09
65.49.1.73 attack
Malicious IP
2024-04-26 17:57:56
65.49.1.71 attackproxy
Apache attacker IP
2024-04-26 17:54:56
65.49.1.18 attack
Malicious IP
2024-04-26 13:11:44
65.49.1.43 attack
Malicious IP / Malware
2024-04-21 02:27:02
65.49.1.96 attack
Malicious IP
2024-04-18 10:59:09
65.49.1.105 attack
Malicious IP
2024-04-18 10:54:53
65.49.194.40 attack
$f2bV_matches
2020-09-05 21:32:31
65.49.194.40 attackbotsspam
$f2bV_matches
2020-09-05 13:09:42
65.49.194.40 attack
Sep  4 16:52:18 IngegnereFirenze sshd[2887]: Failed password for invalid user kali from 65.49.194.40 port 40966 ssh2
...
2020-09-05 05:56:44
65.49.10.98 attackbotsspam
Unauthorized connection attempt from IP address 65.49.10.98 on Port 445(SMB)
2020-08-23 07:08:13
65.49.194.252 attackspam
Aug 16 19:18:19 *hidden* sshd[34564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.49.194.252 user=root Aug 16 19:18:22 *hidden* sshd[34564]: Failed password for *hidden* from 65.49.194.252 port 56850 ssh2 Aug 16 19:24:43 *hidden* sshd[35404]: Invalid user shuchang from 65.49.194.252 port 40882
2020-08-17 01:42:11
65.49.194.40 attack
Aug 12 23:54:40 Tower sshd[24904]: Connection from 65.49.194.40 port 56424 on 192.168.10.220 port 22 rdomain ""
Aug 12 23:54:44 Tower sshd[24904]: Failed password for root from 65.49.194.40 port 56424 ssh2
Aug 12 23:54:44 Tower sshd[24904]: Received disconnect from 65.49.194.40 port 56424:11: Bye Bye [preauth]
Aug 12 23:54:44 Tower sshd[24904]: Disconnected from authenticating user root 65.49.194.40 port 56424 [preauth]
2020-08-13 13:48:18
65.49.194.252 attackspambots
Aug  7 06:50:26 cosmoit sshd[19221]: Failed password for root from 65.49.194.252 port 54836 ssh2
2020-08-07 19:16:01
65.49.137.131 attack
Aug  6 11:25:34 rush sshd[12104]: Failed password for root from 65.49.137.131 port 40028 ssh2
Aug  6 11:29:59 rush sshd[12197]: Failed password for root from 65.49.137.131 port 52052 ssh2
...
2020-08-06 19:36:45
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       65.49.0.0 - 65.49.127.255
CIDR:           65.49.0.0/17
NetName:        HURRICANE-9
NetHandle:      NET-65-49-0-0-1
Parent:         NET65 (NET-65-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Hurricane Electric LLC (HURC)
RegDate:        2007-10-04
Updated:        2012-02-24
Ref:            https://rdap.arin.net/registry/ip/65.49.0.0


OrgName:        Hurricane Electric LLC
OrgId:          HURC
Address:        760 Mission Court
City:           Fremont
StateProv:      CA
PostalCode:     94539
Country:        US
RegDate:        
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/HURC

ReferralServer:  rwhois://rwhois.he.net:4321

OrgTechHandle: ZH17-ARIN
OrgTechName:   Hurricane Electric
OrgTechPhone:  +1-510-580-4100 
OrgTechEmail:  hostmaster@he.net
OrgTechRef:    https://rdap.arin.net/registry/entity/ZH17-ARIN

OrgAbuseHandle: ABUSE1036-ARIN
OrgAbuseName:   Abuse Department
OrgAbusePhone:  +1-510-580-4100 
OrgAbuseEmail:  abuse@he.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE1036-ARIN

RTechHandle: ZH17-ARIN
RTechName:   Hurricane Electric
RTechPhone:  +1-510-580-4100 
RTechEmail:  hostmaster@he.net
RTechRef:    https://rdap.arin.net/registry/entity/ZH17-ARIN

RNOCHandle: ZH17-ARIN
RNOCName:   Hurricane Electric
RNOCPhone:  +1-510-580-4100 
RNOCEmail:  hostmaster@he.net
RNOCRef:    https://rdap.arin.net/registry/entity/ZH17-ARIN

RAbuseHandle: ABUSE1036-ARIN
RAbuseName:   Abuse Department
RAbusePhone:  +1-510-580-4100 
RAbuseEmail:  abuse@he.net
RAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE1036-ARIN

# end


# start

NetRange:       65.49.1.0 - 65.49.1.255
CIDR:           65.49.1.0/24
NetName:        HURRICANE-CE2897-409C062A
NetHandle:      NET-65-49-1-0-1
Parent:         HURRICANE-9 (NET-65-49-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   The Shadowserver Foundation, Inc. (SF-1051)
RegDate:        2025-04-21
Updated:        2025-04-21
Comment:        ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref:            https://rdap.arin.net/registry/ip/65.49.1.0


OrgName:        The Shadowserver Foundation, Inc.
OrgId:          SF-1051
Address:        4695 Chabot Dr. Suite 200
City:           Pleasanton
StateProv:      CA
PostalCode:     94588
Country:        US
RegDate:        2023-03-07
Updated:        2025-04-23
Ref:            https://rdap.arin.net/registry/entity/SF-1051


OrgAbuseHandle: ABUSE9292-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-408-740-7420 
OrgAbuseEmail:  abuse@shadowserver.org
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE9292-ARIN

OrgNOCHandle: NOC33598-ARIN
OrgNOCName:   NOC
OrgNOCPhone:  +1-408-740-7420 
OrgNOCEmail:  noc@shadowserver.org
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC33598-ARIN

OrgTechHandle: NOC33598-ARIN
OrgTechName:   NOC
OrgTechPhone:  +1-408-740-7420 
OrgTechEmail:  noc@shadowserver.org
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC33598-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.he.net:4321.

%rwhois V-1.5:0012b7:00 concierge.he.net (HE-RWHOISd v:dd31ac8)
network:ID;I:NET-65.49.1.0/24
network:Auth-Area:nets
network:Class-Name:network
network:Network-Name;I:NET-65.49.1.0/24
network:Parent;I:NET-65.49.0.0/17
network:IP-Network:65.49.1.0/24
network:Org-Contact;I:POC-CE-2897
network:Tech-Contact;I:POC-HE-NOC
network:Abuse-Contact;I:POC-HE-ABUSE
networ
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 65.49.1.238
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27909
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;65.49.1.238.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110800 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 08 14:30:43 CST 2025
;; MSG SIZE  rcvd: 104
Host info
238.1.49.65.in-addr.arpa is an alias for 238.0-24.1.49.65.in-addr.arpa.
238.0-24.1.49.65.in-addr.arpa domain name pointer scan-79-06.shadowserver.org.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
238.1.49.65.in-addr.arpa	canonical name = 238.0-24.1.49.65.in-addr.arpa.
238.0-24.1.49.65.in-addr.arpa	name = scan-79-06.shadowserver.org.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
200.105.169.181 attackspambots
SMB Server BruteForce Attack
2019-08-21 07:31:46
112.65.201.26 attackspam
Aug 21 02:59:47 server sshd\[26455\]: Invalid user lfs from 112.65.201.26 port 19772
Aug 21 02:59:47 server sshd\[26455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.65.201.26
Aug 21 02:59:49 server sshd\[26455\]: Failed password for invalid user lfs from 112.65.201.26 port 19772 ssh2
Aug 21 03:03:27 server sshd\[31421\]: Invalid user deploy from 112.65.201.26 port 36321
Aug 21 03:03:27 server sshd\[31421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.65.201.26
2019-08-21 08:04:42
157.55.39.89 attack
Automatic report - Banned IP Access
2019-08-21 07:35:43
206.81.7.42 attack
invalid user
2019-08-21 07:41:54
140.207.46.136 attack
Scanning random ports - tries to find possible vulnerable services
2019-08-21 07:44:33
51.68.226.129 attackspam
Invalid user deploy from 51.68.226.129 port 35385
2019-08-21 07:28:22
159.89.227.145 attack
Aug 20 17:49:14 dallas01 sshd[12120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.227.145
Aug 20 17:49:16 dallas01 sshd[12120]: Failed password for invalid user smc from 159.89.227.145 port 56566 ssh2
Aug 20 17:52:21 dallas01 sshd[12657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.227.145
2019-08-21 07:51:49
139.59.140.55 attack
Aug 20 11:19:30 wbs sshd\[13109\]: Invalid user magic from 139.59.140.55
Aug 20 11:19:30 wbs sshd\[13109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.140.55
Aug 20 11:19:32 wbs sshd\[13109\]: Failed password for invalid user magic from 139.59.140.55 port 46670 ssh2
Aug 20 11:23:40 wbs sshd\[13499\]: Invalid user oratest from 139.59.140.55
Aug 20 11:23:40 wbs sshd\[13499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.140.55
2019-08-21 07:43:33
162.247.74.213 attackspambots
Aug 21 01:05:35 herz-der-gamer sshd[12165]: Invalid user john from 162.247.74.213 port 47846
Aug 21 01:05:36 herz-der-gamer sshd[12165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.213
Aug 21 01:05:35 herz-der-gamer sshd[12165]: Invalid user john from 162.247.74.213 port 47846
Aug 21 01:05:38 herz-der-gamer sshd[12165]: Failed password for invalid user john from 162.247.74.213 port 47846 ssh2
...
2019-08-21 07:36:40
51.254.58.226 attackspambots
Aug 20 22:43:02  postfix/smtpd: warning: unknown[51.254.58.226]: SASL LOGIN authentication failed
2019-08-21 08:07:03
190.85.145.162 attackbots
Aug 20 12:17:08 ny01 sshd[18547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.145.162
Aug 20 12:17:11 ny01 sshd[18547]: Failed password for invalid user min from 190.85.145.162 port 43244 ssh2
Aug 20 12:22:20 ny01 sshd[19037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.145.162
2019-08-21 07:35:13
198.211.114.102 attack
Aug 20 18:46:37 lnxmail61 sshd[8778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.114.102
2019-08-21 08:06:10
92.222.36.216 attackspambots
Aug 20 18:11:09 tuxlinux sshd[32431]: Invalid user pj from 92.222.36.216 port 38054
Aug 20 18:11:09 tuxlinux sshd[32431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.36.216 
Aug 20 18:11:09 tuxlinux sshd[32431]: Invalid user pj from 92.222.36.216 port 38054
Aug 20 18:11:09 tuxlinux sshd[32431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.36.216 
Aug 20 18:11:09 tuxlinux sshd[32431]: Invalid user pj from 92.222.36.216 port 38054
Aug 20 18:11:09 tuxlinux sshd[32431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.36.216 
Aug 20 18:11:11 tuxlinux sshd[32431]: Failed password for invalid user pj from 92.222.36.216 port 38054 ssh2
...
2019-08-21 07:50:40
35.0.127.52 attackspam
Automated report - ssh fail2ban:
Aug 21 00:25:39 wrong password, user=root, port=50300, ssh2
Aug 21 00:25:43 wrong password, user=root, port=50300, ssh2
Aug 21 00:25:47 wrong password, user=root, port=50300, ssh2
Aug 21 00:25:51 wrong password, user=root, port=50300, ssh2
2019-08-21 07:33:55
182.23.20.131 attack
19/8/20@10:45:18: FAIL: Alarm-Intrusion address from=182.23.20.131
...
2019-08-21 07:32:05

Recently Reported IPs

18.180.248.78 167.71.236.81 35.236.51.192 119.185.175.112
61.243.126.183 111.43.173.110 75.127.79.235 223.160.172.205
120.229.157.78 34.118.14.29 199.195.253.206 111.22.251.242
82.165.93.36 104.248.142.207 195.78.54.77 147.185.133.111
45.142.193.171 120.239.11.85 112.97.193.142 147.185.133.188