Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.34.49.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33240
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.34.49.243.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120801 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 09 11:48:43 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 243.49.34.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 243.49.34.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.77.40.212 attackbots
SSH Brute Force
2020-03-27 14:20:22
115.236.168.35 attackspambots
Invalid user qec from 115.236.168.35 port 57786
2020-03-27 14:12:40
193.112.44.102 attackbotsspam
$f2bV_matches
2020-03-27 14:31:42
201.157.39.242 attack
Port probing on unauthorized port 445
2020-03-27 14:24:06
94.191.84.38 attackspam
Invalid user ubuntu from 94.191.84.38 port 55920
2020-03-27 14:13:11
194.182.71.107 attack
Mar 27 07:30:38 www sshd\[77634\]: Invalid user couchdb from 194.182.71.107
Mar 27 07:30:38 www sshd\[77634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.182.71.107
Mar 27 07:30:40 www sshd\[77634\]: Failed password for invalid user couchdb from 194.182.71.107 port 55614 ssh2
...
2020-03-27 14:25:05
219.140.198.51 attackspambots
Mar 27 05:19:41 legacy sshd[6526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.140.198.51
Mar 27 05:19:43 legacy sshd[6526]: Failed password for invalid user bran from 219.140.198.51 port 45616 ssh2
Mar 27 05:22:42 legacy sshd[6654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.140.198.51
...
2020-03-27 14:15:37
120.201.125.204 attackspambots
Invalid user papoose from 120.201.125.204 port 54912
2020-03-27 14:45:55
189.80.44.98 attackspam
1585281143 - 03/27/2020 04:52:23 Host: 189.80.44.98/189.80.44.98 Port: 445 TCP Blocked
2020-03-27 14:35:38
59.63.203.117 attackbots
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-03-27 13:58:58
188.213.175.98 attack
Invalid user v from 188.213.175.98 port 56041
2020-03-27 14:02:28
184.105.139.112 attackspambots
Honeypot hit.
2020-03-27 14:20:55
117.217.202.181 attackbotsspam
1585281179 - 03/27/2020 04:52:59 Host: 117.217.202.181/117.217.202.181 Port: 445 TCP Blocked
2020-03-27 14:04:11
222.186.30.167 attackspam
Mar 27 07:01:34 minden010 sshd[11316]: Failed password for root from 222.186.30.167 port 55850 ssh2
Mar 27 07:01:36 minden010 sshd[11316]: Failed password for root from 222.186.30.167 port 55850 ssh2
Mar 27 07:01:39 minden010 sshd[11316]: Failed password for root from 222.186.30.167 port 55850 ssh2
...
2020-03-27 14:09:21
190.0.61.18 attackbots
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-03-27 14:19:58

Recently Reported IPs

193.165.108.105 70.210.128.17 114.119.161.44 143.22.60.77
151.81.19.136 40.80.178.222 53.72.39.26 191.98.182.52
250.77.7.197 49.95.247.111 167.5.209.23 77.179.60.154
143.221.217.88 237.23.128.28 70.83.252.2 72.23.8.222
207.197.218.222 55.35.28.32 92.217.183.81 54.46.217.127