Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       65.49.192.0 - 65.49.239.255
CIDR:           65.49.192.0/19, 65.49.224.0/20
NetName:        CL-1210
NetHandle:      NET-65-49-192-0-1
Parent:         NET65 (NET-65-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Cluster Logic Inc (CL-1210)
RegDate:        2017-10-31
Updated:        2024-10-15
Comment:        Geofeed https://deploy.sioru.net/geofeed/feed.csv
Comment:        Abuse desk: abuse@sioru.com or https://www.it7.net/contact/
Ref:            https://rdap.arin.net/registry/ip/65.49.192.0


OrgName:        Cluster Logic Inc
OrgId:          CL-1210
Address:        4974 Kingsway Ave
Address:        Suite 668
City:           Burnaby
StateProv:      BC
PostalCode:     V5H 4M9
Country:        CA
RegDate:        2016-10-11
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/CL-1210


OrgTechHandle: TECHN1201-ARIN
OrgTechName:   Technical Contact
OrgTechPhone:  +1-408-260-5757 
OrgTechEmail:  arin-tech@sioru.com
OrgTechRef:    https://rdap.arin.net/registry/entity/TECHN1201-ARIN

OrgAbuseHandle: ABUSE3623-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-408-260-5757 
OrgAbuseEmail:  abuse@sioru.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3623-ARIN

OrgNOCHandle: NOC12969-ARIN
OrgNOCName:   NOC
OrgNOCPhone:  +1-408-260-5757 
OrgNOCEmail:  arin-noc@sioru.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC12969-ARIN

# end


# start

NetRange:       65.49.192.0 - 65.49.223.255
CIDR:           65.49.192.0/19
NetName:        CL-65-49-192-0-19
NetHandle:      NET-65-49-192-0-2
Parent:         CL-1210 (NET-65-49-192-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       IT7 Networks Inc (C06778848)
RegDate:        2017-11-01
Updated:        2017-11-01
Ref:            https://rdap.arin.net/registry/ip/65.49.192.0


CustName:       IT7 Networks Inc
Address:        530 W 6th Street
City:           Los Angeles
StateProv:      CA
PostalCode:     90014
Country:        US
RegDate:        2017-10-31
Updated:        2017-10-31
Ref:            https://rdap.arin.net/registry/entity/C06778848

OrgTechHandle: TECHN1201-ARIN
OrgTechName:   Technical Contact
OrgTechPhone:  +1-408-260-5757 
OrgTechEmail:  arin-tech@sioru.com
OrgTechRef:    https://rdap.arin.net/registry/entity/TECHN1201-ARIN

OrgAbuseHandle: ABUSE3623-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-408-260-5757 
OrgAbuseEmail:  abuse@sioru.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3623-ARIN

OrgNOCHandle: NOC12969-ARIN
OrgNOCName:   NOC
OrgNOCPhone:  +1-408-260-5757 
OrgNOCEmail:  arin-noc@sioru.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC12969-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 65.49.192.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62179
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;65.49.192.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025092101 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 22 10:55:31 CST 2025
;; MSG SIZE  rcvd: 105
Host info
21.192.49.65.in-addr.arpa domain name pointer 65.49.192.21.16clouds.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.192.49.65.in-addr.arpa	name = 65.49.192.21.16clouds.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.10.171.234 attack
Unauthorized connection attempt from IP address 177.10.171.234 on Port 445(SMB)
2020-04-18 22:27:42
182.71.214.154 attackbotsspam
Unauthorized connection attempt from IP address 182.71.214.154 on Port 445(SMB)
2020-04-18 22:11:07
2.139.209.78 attackspam
Apr 18 16:07:08 server sshd[9739]: Failed password for root from 2.139.209.78 port 46434 ssh2
Apr 18 16:12:36 server sshd[13734]: Failed password for invalid user pr from 2.139.209.78 port 51051 ssh2
Apr 18 16:17:01 server sshd[17354]: Failed password for invalid user ubuntu from 2.139.209.78 port 40275 ssh2
2020-04-18 22:22:15
159.65.77.254 attackbotsspam
2020-04-18T12:16:03.696179abusebot-5.cloudsearch.cf sshd[8824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.77.254  user=root
2020-04-18T12:16:05.724655abusebot-5.cloudsearch.cf sshd[8824]: Failed password for root from 159.65.77.254 port 48992 ssh2
2020-04-18T12:20:31.709584abusebot-5.cloudsearch.cf sshd[9007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.77.254  user=root
2020-04-18T12:20:33.865778abusebot-5.cloudsearch.cf sshd[9007]: Failed password for root from 159.65.77.254 port 38278 ssh2
2020-04-18T12:24:55.887889abusebot-5.cloudsearch.cf sshd[9109]: Invalid user test from 159.65.77.254 port 55804
2020-04-18T12:24:55.894126abusebot-5.cloudsearch.cf sshd[9109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.77.254
2020-04-18T12:24:55.887889abusebot-5.cloudsearch.cf sshd[9109]: Invalid user test from 159.65.77.254 port 55804
2020-04-
...
2020-04-18 22:11:41
139.59.254.93 attack
Apr 18 13:51:56 ns382633 sshd\[2439\]: Invalid user admin1 from 139.59.254.93 port 37310
Apr 18 13:51:56 ns382633 sshd\[2439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.254.93
Apr 18 13:51:58 ns382633 sshd\[2439\]: Failed password for invalid user admin1 from 139.59.254.93 port 37310 ssh2
Apr 18 14:01:11 ns382633 sshd\[4323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.254.93  user=root
Apr 18 14:01:14 ns382633 sshd\[4323\]: Failed password for root from 139.59.254.93 port 57856 ssh2
2020-04-18 22:28:11
187.177.164.233 attackspambots
Automatic report - Port Scan Attack
2020-04-18 22:10:38
118.187.4.172 attack
Apr 18 14:06:03 legacy sshd[31608]: Failed password for root from 118.187.4.172 port 43596 ssh2
Apr 18 14:09:08 legacy sshd[31681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.187.4.172
Apr 18 14:09:11 legacy sshd[31681]: Failed password for invalid user testmail from 118.187.4.172 port 46238 ssh2
...
2020-04-18 22:21:54
125.124.185.167 attack
Distributed brute force attack
2020-04-18 21:54:04
221.236.77.85 attack
Unauthorized connection attempt detected from IP address 221.236.77.85 to port 22 [T]
2020-04-18 22:15:01
36.78.201.166 attackbotsspam
Unauthorized connection attempt from IP address 36.78.201.166 on Port 445(SMB)
2020-04-18 22:02:28
185.50.149.3 attackbots
Apr 18 15:45:41 mail.srvfarm.net postfix/smtpd[33458]: warning: unknown[185.50.149.3]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 18 15:45:41 mail.srvfarm.net postfix/smtps/smtpd[37547]: warning: unknown[185.50.149.3]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 18 15:45:41 mail.srvfarm.net postfix/smtpd[35094]: warning: unknown[185.50.149.3]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 18 15:45:41 mail.srvfarm.net postfix/smtpd[33458]: lost connection after AUTH from unknown[185.50.149.3]
Apr 18 15:45:41 mail.srvfarm.net postfix/smtps/smtpd[37547]: lost connection after AUTH from unknown[185.50.149.3]
2020-04-18 21:56:32
103.219.112.48 attack
SSH invalid-user multiple login attempts
2020-04-18 21:51:30
167.71.76.122 attackbots
Apr 18 13:58:51 meumeu sshd[17509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.76.122 
Apr 18 13:58:53 meumeu sshd[17509]: Failed password for invalid user ym from 167.71.76.122 port 32922 ssh2
Apr 18 14:01:33 meumeu sshd[18242]: Failed password for root from 167.71.76.122 port 40520 ssh2
...
2020-04-18 22:00:47
193.112.250.77 attackspambots
SSH brute-force: detected 6 distinct usernames within a 24-hour window.
2020-04-18 22:20:36
5.196.197.77 attackspam
Multiple SSH login attempts.
2020-04-18 21:50:43

Recently Reported IPs

2601:19c:8100:5190:3cea:bda5:7366:b8bb 209.97.138.50 8.10.75.51 124.238.31.225
156.253.15.251 2620:18c::209 35.203.211.20 46.30.213.183
49.7.227.204 2001:8a0:7f44:1400:3859:4338:143e:5753 176.11.51.212 20.169.107.208
117.31.157.228 245.27.40.199 10.128.8.11 185.235.47.255
185.189.114.170 147.185.133.40 2800:e2:c80:4d9:a13b:51c0:7bb1:53fd 106.14.18.142