Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.49.201.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21445
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;199.49.201.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 14:13:19 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 148.201.49.199.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.201.49.199.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
191.250.143.205 attack
Unauthorized connection attempt from IP address 191.250.143.205 on Port 445(SMB)
2019-07-08 12:24:07
195.242.232.14 attackbotsspam
mail auth brute force
2019-07-08 12:57:11
77.234.195.123 attackspambots
[portscan] Port scan
2019-07-08 12:19:52
195.3.146.88 attackbotsspam
Port scan on 16 port(s): 3589 3689 4489 8888 8899 8922 33689 33789 33829 33889 33891 33892 33893 33897 33899 35389
2019-07-08 12:48:30
221.214.60.17 attackspambots
firewall-block, port(s): 23/tcp
2019-07-08 12:43:27
207.46.13.180 attack
Automatic report - Web App Attack
2019-07-08 12:14:59
34.255.122.144 attack
php WP PHPmyadamin ABUSE blocked for 12h
2019-07-08 12:25:35
95.221.8.61 attack
Unauthorized connection attempt from IP address 95.221.8.61 on Port 445(SMB)
2019-07-08 12:26:20
119.167.113.101 attackspam
Joomla HTTP User Agent Object Injection Vulnerability
2019-07-08 12:42:10
165.227.151.59 attackspambots
Attempted SSH login
2019-07-08 12:55:31
191.53.251.197 attack
Brute force attempt
2019-07-08 12:16:56
36.22.191.190 attackbots
Unauthorized connection attempt from IP address 36.22.191.190 on Port 445(SMB)
2019-07-08 12:23:48
186.118.138.10 attackbots
Jul  8 03:29:33 [host] sshd[15103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.118.138.10  user=root
Jul  8 03:29:35 [host] sshd[15103]: Failed password for root from 186.118.138.10 port 58442 ssh2
Jul  8 03:32:22 [host] sshd[15378]: Invalid user student04 from 186.118.138.10
2019-07-08 12:22:24
154.119.7.3 attackspambots
Jul  8 01:58:24 lnxmail61 sshd[19837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.119.7.3
Jul  8 01:58:26 lnxmail61 sshd[19837]: Failed password for invalid user users from 154.119.7.3 port 50338 ssh2
Jul  8 02:01:04 lnxmail61 sshd[21114]: Failed password for root from 154.119.7.3 port 60549 ssh2
2019-07-08 12:39:54
92.246.76.133 attackspam
Brute forcing RDP port 3389
2019-07-08 12:11:52

Recently Reported IPs

14.128.50.198 178.80.119.228 20.134.34.111 236.184.70.49
12.66.103.84 44.15.130.120 237.122.166.183 149.134.201.175
36.4.141.55 94.247.136.168 190.86.132.51 24.54.53.133
19.243.31.180 71.176.150.202 91.21.32.213 230.62.60.195
91.130.42.59 156.131.164.35 241.102.90.132 249.104.234.65