Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lucena

Region: Calabarzon

Country: Philippines

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
49.145.68.83 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-02 15:13:16
49.145.65.243 attackspam
Unauthorized connection attempt from IP address 49.145.65.243 on Port 445(SMB)
2020-07-10 16:27:24
49.145.65.27 attackbots
Unauthorized connection attempt from IP address 49.145.65.27 on Port 445(SMB)
2020-01-31 21:09:02
49.145.6.116 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 25-01-2020 04:55:14.
2020-01-25 14:36:27
49.145.64.197 attackbots
1579149913 - 01/16/2020 05:45:13 Host: 49.145.64.197/49.145.64.197 Port: 445 TCP Blocked
2020-01-16 19:50:08
49.145.60.96 attackbots
Unauthorized connection attempt from IP address 49.145.60.96 on Port 445(SMB)
2020-01-04 02:53:31
49.145.64.88 attack
1576996129 - 12/22/2019 07:28:49 Host: 49.145.64.88/49.145.64.88 Port: 445 TCP Blocked
2019-12-22 16:32:15
49.145.62.156 attackspam
Unauthorized connection attempt detected from IP address 49.145.62.156 to port 445
2019-12-11 21:31:04
49.145.6.19 attackbotsspam
Sun, 21 Jul 2019 07:35:19 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 01:21:18
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.145.6.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47448
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.145.6.96.			IN	A

;; AUTHORITY SECTION:
.			493	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023071600 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jul 16 23:57:53 CST 2023
;; MSG SIZE  rcvd: 104
Host info
96.6.145.49.in-addr.arpa domain name pointer dsl.49.145.6.96.pldt.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
96.6.145.49.in-addr.arpa	name = dsl.49.145.6.96.pldt.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.162.235.113 attack
2019-11-07T08:22:53.237440mail01 postfix/smtpd[15578]: warning: unknown[185.162.235.113]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-07T08:28:09.418316mail01 postfix/smtpd[20931]: warning: unknown[185.162.235.113]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-07T08:28:09.418672mail01 postfix/smtpd[16224]: warning: unknown[185.162.235.113]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-07 15:30:27
202.100.183.157 attack
Unauthorised access (Nov  7) SRC=202.100.183.157 LEN=44 TTL=239 ID=56105 TCP DPT=1433 WINDOW=1024 SYN
2019-11-07 15:43:21
175.157.42.42 attack
SpamReport
2019-11-07 15:10:20
46.101.88.10 attackspambots
FTP Brute-Force reported by Fail2Ban
2019-11-07 15:44:08
91.191.223.207 attack
Nov  7 08:47:53 server sshd\[19567\]: Invalid user mi from 91.191.223.207 port 52784
Nov  7 08:47:53 server sshd\[19567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.191.223.207
Nov  7 08:47:56 server sshd\[19567\]: Failed password for invalid user mi from 91.191.223.207 port 52784 ssh2
Nov  7 08:56:51 server sshd\[21937\]: User root from 91.191.223.207 not allowed because listed in DenyUsers
Nov  7 08:56:51 server sshd\[21937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.191.223.207  user=root
2019-11-07 15:18:24
113.177.79.240 attack
Unauthorized connection attempt from IP address 113.177.79.240 on Port 445(SMB)
2019-11-07 15:13:12
80.84.57.107 attack
REQUESTED PAGE: /shop/
2019-11-07 15:36:30
71.6.147.254 attackbotsspam
Connection by 71.6.147.254 on port: 8060 got caught by honeypot at 11/7/2019 5:29:47 AM
2019-11-07 15:36:46
222.186.173.180 attackspam
Nov  7 08:00:19 vmd17057 sshd\[2373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180  user=root
Nov  7 08:00:21 vmd17057 sshd\[2373\]: Failed password for root from 222.186.173.180 port 5278 ssh2
Nov  7 08:00:25 vmd17057 sshd\[2373\]: Failed password for root from 222.186.173.180 port 5278 ssh2
...
2019-11-07 15:04:27
108.169.181.185 attack
Automatic report - XMLRPC Attack
2019-11-07 15:25:34
92.118.38.54 attack
brute force attack on mail server for almost a week now. blocked ip and complete subnet.
2019-11-07 15:34:29
198.108.67.58 attack
Port scan: Attack repeated for 24 hours
2019-11-07 15:26:44
106.54.219.94 attackspambots
Nov  7 07:57:40 markkoudstaal sshd[29532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.219.94
Nov  7 07:57:42 markkoudstaal sshd[29532]: Failed password for invalid user lcq from 106.54.219.94 port 55926 ssh2
Nov  7 08:01:39 markkoudstaal sshd[29820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.219.94
2019-11-07 15:15:00
27.128.233.104 attackbotsspam
SSH Brute-Force attacks
2019-11-07 15:22:06
109.78.33.158 attackspam
SpamReport
2019-11-07 15:14:30

Recently Reported IPs

49.145.5.96 49.145.7.96 49.145.8.96 49.145.9.96
174.138.24.218 124.6.181.36 139.59.60.138 68.183.75.21
124.1.181.36 124.7.181.36 124.6.1.36 1.6.181.36
124.6.181.1 49.150.90.0 49.150.1.0 49.150.2.0
49.150.5.0 49.150.6.0 49.150.7.0 49.150.8.0