Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bangkok

Region: Bangkok

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.144.138.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11977
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;203.144.138.249.		IN	A

;; AUTHORITY SECTION:
.			222	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023100900 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 09 22:35:58 CST 2023
;; MSG SIZE  rcvd: 108
Host info
249.138.144.203.in-addr.arpa domain name pointer 203-144-138-249.static.asianet.co.th.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
249.138.144.203.in-addr.arpa	name = 203-144-138-249.static.asianet.co.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.123.113.94 attack
Unauthorized connection attempt from IP address 103.123.113.94 on Port 445(SMB)
2019-08-22 06:12:41
151.40.255.111 attack
Automatic report - Port Scan Attack
2019-08-22 06:23:22
167.71.56.82 attackspam
Aug 21 21:53:26 localhost sshd\[94624\]: Invalid user marixl from 167.71.56.82 port 41868
Aug 21 21:53:26 localhost sshd\[94624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.56.82
Aug 21 21:53:29 localhost sshd\[94624\]: Failed password for invalid user marixl from 167.71.56.82 port 41868 ssh2
Aug 21 21:57:17 localhost sshd\[94832\]: Invalid user lxpopuser from 167.71.56.82 port 58584
Aug 21 21:57:17 localhost sshd\[94832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.56.82
...
2019-08-22 06:20:07
159.203.77.51 attackspam
Invalid user autograph from 159.203.77.51 port 55400
2019-08-22 06:15:18
103.219.112.251 attack
SSH invalid-user multiple login try
2019-08-22 06:09:30
197.248.2.43 attackbots
vps1:sshd-InvalidUser
2019-08-22 06:06:22
182.72.219.58 attackbots
Unauthorized connection attempt from IP address 182.72.219.58 on Port 445(SMB)
2019-08-22 05:59:38
183.83.238.34 attackbots
Unauthorized connection attempt from IP address 183.83.238.34 on Port 445(SMB)
2019-08-22 06:24:47
103.50.148.61 attackspam
Invalid user yuan from 103.50.148.61 port 56550
2019-08-22 06:06:00
106.12.7.75 attackspambots
Aug 21 17:44:15 dedicated sshd[20532]: Invalid user money from 106.12.7.75 port 36698
2019-08-22 06:08:57
106.13.48.201 attack
Aug 21 23:46:20 lnxweb62 sshd[20613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.48.201
Aug 21 23:46:23 lnxweb62 sshd[20613]: Failed password for invalid user daniele from 106.13.48.201 port 42646 ssh2
Aug 21 23:51:41 lnxweb62 sshd[23610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.48.201
2019-08-22 05:58:48
183.88.243.79 attack
Unauthorized connection attempt from IP address 183.88.243.79 on Port 445(SMB)
2019-08-22 06:05:01
112.30.128.67 attackspam
08/21/2019-10:48:11.433734 112.30.128.67 Protocol: 6 ET SCAN Suspicious inbound to mySQL port 3306
2019-08-22 06:22:58
93.125.110.74 attackbotsspam
Unauthorized connection attempt from IP address 93.125.110.74 on Port 445(SMB)
2019-08-22 06:16:11
187.94.111.8 attackspam
$f2bV_matches
2019-08-22 06:10:30

Recently Reported IPs

6.102.39.226 188.213.34.77 149.28.149.50 154.83.13.93
124.217.251.249 185.62.153.70 128.199.208.124 185.243.57.56
91.92.114.93 1.179.201.209 95.32.76.84 6.26.122.160
209.141.39.37 134.209.129.16 94.25.238.154 45.79.114.52
45.121.163.3 37.30.114.144 129.179.192.252 89.167.31.81