Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Philippines (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
49.148.254.240 attackbots
Icarus honeypot on github
2020-09-15 20:22:30
49.148.254.240 attack
Icarus honeypot on github
2020-09-15 12:24:57
49.148.254.240 attackbotsspam
Icarus honeypot on github
2020-09-15 04:33:02
49.148.244.202 attackspam
illegal hacking into Ubisoft with compromised details
2020-04-09 07:26:18
49.148.212.42 attackbotsspam
445/tcp
[2019-09-28]1pkt
2019-09-28 20:05:28
49.148.248.174 attackspambots
Lines containing failures of 49.148.248.174 (max 1000)
Aug 10 07:37:49 Server sshd[18015]: Did not receive identification string from 49.148.248.174 port 49946
Aug 10 07:38:03 Server sshd[18016]: Invalid user dircreate from 49.148.248.174 port 12400
Aug 10 07:38:04 Server sshd[18016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.148.248.174
Aug 10 07:38:06 Server sshd[18016]: Failed password for invalid user dircreate from 49.148.248.174 port 12400 ssh2
Aug 10 07:38:07 Server sshd[18016]: Connection closed by invalid user dircreate 49.148.248.174 port 12400 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.148.248.174
2019-08-10 20:13:00
49.148.246.131 attack
Sun, 21 Jul 2019 07:36:07 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 22:49:51
49.148.216.113 attackspambots
Unauthorized connection attempt from IP address 49.148.216.113 on Port 445(SMB)
2019-07-14 08:27:05
49.148.224.164 attackbotsspam
TCP port 445 (SMB) attempt blocked by firewall. [2019-06-25 08:48:48]
2019-06-25 23:21:22
49.148.210.24 attackspambots
445/tcp
[2019-06-22]1pkt
2019-06-23 03:10:57
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.148.2.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36252
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.148.2.121.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 23:17:53 CST 2025
;; MSG SIZE  rcvd: 105
Host info
121.2.148.49.in-addr.arpa domain name pointer dsl.49.148.2.121.pldt.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
121.2.148.49.in-addr.arpa	name = dsl.49.148.2.121.pldt.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
216.218.206.111 attackspambots
Unauthorized connection attempt from IP address 216.218.206.111 on Port 445(SMB)
2020-07-18 03:15:21
95.243.136.198 attackspam
Jul 17 18:20:21 scw-tender-jepsen sshd[18369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.243.136.198
Jul 17 18:20:24 scw-tender-jepsen sshd[18369]: Failed password for invalid user user2 from 95.243.136.198 port 54822 ssh2
2020-07-18 03:18:31
61.157.198.170 attackbotsspam
Jul 17 06:09:08 Host-KLAX-C dovecot: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=61.157.198.170, lip=185.198.26.142, TLS, session=
...
2020-07-18 03:12:01
195.54.160.183 attackspambots
2020-07-17T10:09:48.0847141495-001 sshd[29756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.54.160.183
2020-07-17T10:09:47.9452241495-001 sshd[29756]: Invalid user leo from 195.54.160.183 port 27032
2020-07-17T10:09:50.1017621495-001 sshd[29756]: Failed password for invalid user leo from 195.54.160.183 port 27032 ssh2
2020-07-17T10:09:51.5185801495-001 sshd[29758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.54.160.183  user=root
2020-07-17T10:09:53.9483091495-001 sshd[29758]: Failed password for root from 195.54.160.183 port 41354 ssh2
2020-07-17T14:38:21.1843231495-001 sshd[40405]: Invalid user postgres from 195.54.160.183 port 38881
...
2020-07-18 03:19:27
46.101.167.101 attack
2020-07-17T20:22:25.353555n23.at sshd[1874999]: Invalid user teamspeak from 46.101.167.101 port 34842
2020-07-17T20:22:26.836919n23.at sshd[1874999]: Failed password for invalid user teamspeak from 46.101.167.101 port 34842 ssh2
2020-07-17T20:31:54.895723n23.at sshd[1882259]: Invalid user caspar from 46.101.167.101 port 60184
...
2020-07-18 03:31:11
125.215.207.44 attackbotsspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-18 03:01:22
77.229.115.171 attack
Automatic report - Port Scan Attack
2020-07-18 03:23:39
190.137.57.128 attack
Automatic report - Banned IP Access
2020-07-18 02:54:15
167.172.234.193 attack
167.172.234.193 - - [17/Jul/2020:21:17:58 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.172.234.193 - - [17/Jul/2020:21:17:59 +0200] "POST /wp-login.php HTTP/1.1" 200 6311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.172.234.193 - - [17/Jul/2020:21:18:00 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-18 03:18:12
103.151.191.28 attackbotsspam
(sshd) Failed SSH login from 103.151.191.28 (-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 17 20:09:24 s1 sshd[3246]: Invalid user yiran from 103.151.191.28 port 58762
Jul 17 20:09:26 s1 sshd[3246]: Failed password for invalid user yiran from 103.151.191.28 port 58762 ssh2
Jul 17 20:19:23 s1 sshd[3512]: Invalid user milutinovic from 103.151.191.28 port 49202
Jul 17 20:19:25 s1 sshd[3512]: Failed password for invalid user milutinovic from 103.151.191.28 port 49202 ssh2
Jul 17 20:24:30 s1 sshd[3709]: Invalid user send from 103.151.191.28 port 36770
2020-07-18 03:22:51
139.99.156.158 attackbotsspam
139.99.156.158 - - [17/Jul/2020:18:41:13 +0200] "POST /xmlrpc.php HTTP/1.1" 403 461 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.99.156.158 - - [17/Jul/2020:18:55:25 +0200] "POST /xmlrpc.php HTTP/1.1" 403 15184 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-18 02:58:17
193.112.143.80 attackspam
$f2bV_matches
2020-07-18 02:52:31
83.150.212.244 attack
Invalid user fitz from 83.150.212.244 port 46258
2020-07-18 03:14:13
139.186.8.212 attackspambots
Jul 17 12:32:05 server1 sshd\[24331\]: Invalid user dt from 139.186.8.212
Jul 17 12:32:05 server1 sshd\[24331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.186.8.212 
Jul 17 12:32:07 server1 sshd\[24331\]: Failed password for invalid user dt from 139.186.8.212 port 51012 ssh2
Jul 17 12:35:33 server1 sshd\[25289\]: Invalid user tnc from 139.186.8.212
Jul 17 12:35:33 server1 sshd\[25289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.186.8.212 
...
2020-07-18 03:13:27
14.56.180.103 attack
$f2bV_matches
2020-07-18 03:29:49

Recently Reported IPs

116.63.6.90 48.156.177.82 144.3.64.114 173.175.189.40
178.27.230.210 46.77.238.60 241.150.218.131 125.53.209.127
2.50.102.245 113.26.59.167 63.141.47.210 230.179.246.232
119.53.112.104 61.93.14.227 198.168.6.102 235.114.118.55
224.243.229.154 19.240.67.23 239.92.137.19 232.5.77.21