Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.48.149.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26648
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.48.149.49.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 19:24:26 CST 2022
;; MSG SIZE  rcvd: 106
Host info
49.149.48.116.in-addr.arpa domain name pointer 049.149.48.116.static.netvigator.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.149.48.116.in-addr.arpa	name = 049.149.48.116.static.netvigator.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.234.5.62 attackspam
Invalid user ella from 49.234.5.62 port 50930
2020-05-30 14:33:54
190.109.84.219 attackbots
persona non grata
2020-05-30 14:37:36
190.53.171.193 attack
Email rejected due to spam filtering
2020-05-30 15:00:43
175.118.126.81 attackbots
2020-05-30T08:14:59.305398lavrinenko.info sshd[9100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.118.126.81
2020-05-30T08:14:59.292085lavrinenko.info sshd[9100]: Invalid user apache2 from 175.118.126.81 port 34016
2020-05-30T08:15:01.730498lavrinenko.info sshd[9100]: Failed password for invalid user apache2 from 175.118.126.81 port 34016 ssh2
2020-05-30T08:17:18.469364lavrinenko.info sshd[9170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.118.126.81  user=root
2020-05-30T08:17:20.643406lavrinenko.info sshd[9170]: Failed password for root from 175.118.126.81 port 34316 ssh2
...
2020-05-30 14:32:55
198.23.58.159 attackspambots
/OLD/
2020-05-30 14:45:28
36.112.134.215 attackbots
May 30 03:08:03 ws22vmsma01 sshd[86792]: Failed password for root from 36.112.134.215 port 45814 ssh2
May 30 03:16:27 ws22vmsma01 sshd[95759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.112.134.215
...
2020-05-30 14:19:27
31.22.169.141 attack
Automatic report - Port Scan Attack
2020-05-30 14:41:11
91.121.211.59 attackspambots
2020-05-30T07:23:28.347257lavrinenko.info sshd[7206]: Failed password for invalid user mario from 91.121.211.59 port 43142 ssh2
2020-05-30T07:25:19.646384lavrinenko.info sshd[7280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.211.59  user=root
2020-05-30T07:25:21.303905lavrinenko.info sshd[7280]: Failed password for root from 91.121.211.59 port 47432 ssh2
2020-05-30T07:27:09.192264lavrinenko.info sshd[7321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.211.59  user=root
2020-05-30T07:27:10.950147lavrinenko.info sshd[7321]: Failed password for root from 91.121.211.59 port 51720 ssh2
...
2020-05-30 14:26:49
106.13.110.74 attackspambots
Invalid user gsk from 106.13.110.74 port 44162
2020-05-30 15:03:23
106.13.17.8 attackspambots
May 30 09:14:06 root sshd[7089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.17.8  user=root
May 30 09:14:08 root sshd[7089]: Failed password for root from 106.13.17.8 port 46086 ssh2
...
2020-05-30 14:21:32
42.103.52.101 attack
Invalid user guest5 from 42.103.52.101 port 39498
2020-05-30 14:22:19
159.89.115.74 attack
May 30 02:25:06 lanister sshd[7006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.115.74  user=root
May 30 02:25:08 lanister sshd[7006]: Failed password for root from 159.89.115.74 port 34934 ssh2
May 30 02:28:41 lanister sshd[7065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.115.74  user=root
May 30 02:28:43 lanister sshd[7065]: Failed password for root from 159.89.115.74 port 39880 ssh2
2020-05-30 14:38:34
210.56.23.100 attack
May 29 23:59:57 pixelmemory sshd[2723472]: Invalid user elastic from 210.56.23.100 port 51496
May 29 23:59:57 pixelmemory sshd[2723472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.56.23.100 
May 29 23:59:57 pixelmemory sshd[2723472]: Invalid user elastic from 210.56.23.100 port 51496
May 30 00:00:00 pixelmemory sshd[2723472]: Failed password for invalid user elastic from 210.56.23.100 port 51496 ssh2
May 30 00:02:10 pixelmemory sshd[2726051]: Invalid user informav from 210.56.23.100 port 52680
...
2020-05-30 15:05:11
118.89.108.37 attack
k+ssh-bruteforce
2020-05-30 14:36:00
113.178.69.166 attackspambots
(eximsyntax) Exim syntax errors from 113.178.69.166 (VN/Vietnam/static.vnpt.vn): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-30 08:20:54 SMTP call from [113.178.69.166] dropped: too many syntax or protocol errors (last command was "?\034?\032?\027?\031?\034?\033?\030?\032?\026?\016?\r?\v?\f?	?")
2020-05-30 15:02:35

Recently Reported IPs

116.48.16.169 116.48.166.119 116.48.187.188 116.48.15.185
116.48.166.62 116.48.166.193 116.48.235.12 116.48.26.25
116.48.187.23 116.48.25.86 114.106.172.169 116.48.27.91
116.48.44.125 116.48.38.88 116.48.166.120 116.48.44.192
116.48.44.162 116.48.5.227 116.48.47.135 116.48.44.61