Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 223.149.48.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12702
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;223.149.48.53.			IN	A

;; AUTHORITY SECTION:
.			311	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400

;; Query time: 197 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 02:18:17 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 53.48.149.223.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.48.149.223.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
59.174.149.148 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-02 05:53:34
111.231.94.138 attack
(sshd) Failed SSH login from 111.231.94.138 (-): 5 in the last 3600 secs
2019-07-02 06:04:37
141.98.10.32 attackspambots
Rude login attack (20 tries in 1d)
2019-07-02 06:16:49
209.141.62.45 attackbotsspam
port scan and connect, tcp 22 (ssh)
2019-07-02 05:37:28
212.19.116.205 attack
Automatic report - SQL Injection Attempts
2019-07-02 05:54:28
125.212.247.101 attackbotsspam
Automatic report - Web App Attack
2019-07-02 05:58:53
77.221.21.148 attackbots
Invalid user landry from 77.221.21.148 port 30448
2019-07-02 06:08:35
116.97.74.124 attack
port scan and connect, tcp 22 (ssh)
2019-07-02 06:10:41
219.248.137.8 attackspambots
2019-07-01T21:23:24.933197hub.schaetter.us sshd\[8702\]: Invalid user server from 219.248.137.8
2019-07-01T21:23:24.966791hub.schaetter.us sshd\[8702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.248.137.8
2019-07-01T21:23:27.323196hub.schaetter.us sshd\[8702\]: Failed password for invalid user server from 219.248.137.8 port 42291 ssh2
2019-07-01T21:27:34.679701hub.schaetter.us sshd\[8709\]: Invalid user qhsupport from 219.248.137.8
2019-07-01T21:27:34.714258hub.schaetter.us sshd\[8709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.248.137.8
...
2019-07-02 05:53:06
139.59.249.255 attack
v+ssh-bruteforce
2019-07-02 05:38:12
80.82.70.118 attackspambots
Port scan: Attacks repeated for a week
2019-07-02 06:18:04
120.52.152.15 attack
Portscan or hack attempt detected by psad/fwsnort
2019-07-02 05:40:31
59.50.231.105 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-02 05:57:33
177.102.211.15 attack
firewall-block, port(s): 23/tcp
2019-07-02 05:47:30
141.98.10.41 attack
2019-06-24 13:16:31 -> 2019-07-01 22:09:24 : 494 login attempts (141.98.10.41)
2019-07-02 06:06:34

Recently Reported IPs

223.149.48.190 223.149.48.55 223.149.49.255 223.149.50.199
223.149.5.151 223.149.52.137 223.149.52.246 223.149.52.96
223.149.52.242 223.149.6.59 223.149.99.126 223.150.101.69
223.150.0.35 223.150.155.222 223.149.7.225 223.150.174.95
223.150.226.22 223.150.106.148 223.150.174.10 223.150.228.103