Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.49.148.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41841
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.49.148.216.			IN	A

;; AUTHORITY SECTION:
.			123	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062601 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 27 06:05:46 CST 2022
;; MSG SIZE  rcvd: 107
Host info
216.148.49.213.in-addr.arpa domain name pointer ip-213-49-148-216.dsl.scarlet.be.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
216.148.49.213.in-addr.arpa	name = ip-213-49-148-216.dsl.scarlet.be.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.225.110.173 attackbotsspam
[portscan] tcp/21 [FTP]
[scan/connect: 2 time(s)]
*(RWIN=65535)(07111009)
2019-07-11 16:32:12
172.72.197.222 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-11 02:27:54,576 INFO [amun_request_handler] PortScan Detected on Port: 445 (172.72.197.222)
2019-07-11 16:37:49
189.91.3.45 attackbotsspam
failed_logins
2019-07-11 16:34:48
153.36.232.36 attackbotsspam
2019-07-11T11:19:23.617540stark.klein-stark.info sshd\[24252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.232.36  user=root
2019-07-11T11:19:25.431356stark.klein-stark.info sshd\[24252\]: Failed password for root from 153.36.232.36 port 28730 ssh2
2019-07-11T11:19:29.403981stark.klein-stark.info sshd\[24252\]: Failed password for root from 153.36.232.36 port 28730 ssh2
...
2019-07-11 17:22:02
186.90.190.190 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-11 02:18:37,903 INFO [amun_request_handler] PortScan Detected on Port: 445 (186.90.190.190)
2019-07-11 17:08:52
94.23.46.106 attack
EventTime:Thu Jul 11 13:50:31 AEST 2019,Protocol:UDP,VendorEventCode:RT_FLOW_SESSION_DENY,TargetPort:53,SourceIP:94.23.46.106,SourcePort:38082
2019-07-11 16:33:09
190.145.154.164 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-05-16/07-11]8pkt,1pt.(tcp)
2019-07-11 17:15:26
109.73.175.142 attackbots
TCP port 23 (Telnet) attempt blocked by firewall. [2019-07-11 05:49:38]
2019-07-11 16:54:48
102.165.35.71 attackspam
445/tcp 445/tcp
[2019-05-15/07-11]2pkt
2019-07-11 16:39:27
178.128.6.108 attack
DATE:2019-07-11_05:50:23, IP:178.128.6.108, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-07-11 16:52:54
123.54.124.121 attackspam
Jul 10 22:50:53 mailman postfix/smtpd[9565]: warning: unknown[123.54.124.121]: SASL LOGIN authentication failed: authentication failure
2019-07-11 16:38:53
36.84.65.78 attackbots
445/tcp 445/tcp 445/tcp...
[2019-06-27/07-11]5pkt,1pt.(tcp)
2019-07-11 17:06:37
79.111.123.46 attack
[portscan] Port scan
2019-07-11 16:35:16
200.207.63.165 attack
Jul 11 08:51:09 vps647732 sshd[21322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.207.63.165
Jul 11 08:51:11 vps647732 sshd[21322]: Failed password for invalid user google from 200.207.63.165 port 43493 ssh2
...
2019-07-11 16:49:57
157.230.254.143 attackspam
Jul 11 08:27:46 ArkNodeAT sshd\[28383\]: Invalid user anna from 157.230.254.143
Jul 11 08:27:46 ArkNodeAT sshd\[28383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.254.143
Jul 11 08:27:48 ArkNodeAT sshd\[28383\]: Failed password for invalid user anna from 157.230.254.143 port 51162 ssh2
2019-07-11 16:36:36

Recently Reported IPs

137.226.121.9 220.135.48.6 220.246.103.114 220.135.126.188
221.7.131.201 169.229.186.237 180.76.119.210 169.229.202.61
169.229.202.76 169.229.202.79 137.226.192.223 137.226.191.241
180.76.140.121 137.226.175.49 169.229.170.113 220.173.122.22
220.135.130.211 220.173.123.189 180.76.132.136 180.76.128.232