Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cebu City

Region: Central Visayas

Country: Philippines

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.148.235.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56590
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.148.235.16.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 08:32:37 CST 2025
;; MSG SIZE  rcvd: 106
Host info
16.235.148.49.in-addr.arpa domain name pointer dsl.49.148.235.16.pldt.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
16.235.148.49.in-addr.arpa	name = dsl.49.148.235.16.pldt.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.23.9.102 attackspambots
2020-09-17T10:11:19.305444mail.broermann.family sshd[19719]: Failed password for root from 94.23.9.102 port 33716 ssh2
2020-09-17T10:15:10.944129mail.broermann.family sshd[19883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns394425.ip-94-23-9.eu  user=root
2020-09-17T10:15:13.206754mail.broermann.family sshd[19883]: Failed password for root from 94.23.9.102 port 46300 ssh2
2020-09-17T10:19:05.958994mail.broermann.family sshd[20043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns394425.ip-94-23-9.eu  user=root
2020-09-17T10:19:07.147985mail.broermann.family sshd[20043]: Failed password for root from 94.23.9.102 port 58872 ssh2
...
2020-09-17 18:55:06
149.56.141.170 attack
Sep 16 19:35:51 hpm sshd\[21960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.141.170  user=root
Sep 16 19:35:53 hpm sshd\[21960\]: Failed password for root from 149.56.141.170 port 60652 ssh2
Sep 16 19:40:34 hpm sshd\[22526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.141.170  user=root
Sep 16 19:40:36 hpm sshd\[22526\]: Failed password for root from 149.56.141.170 port 44528 ssh2
Sep 16 19:45:22 hpm sshd\[22957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.141.170  user=root
2020-09-17 19:01:24
212.232.41.148 attack
CMS (WordPress or Joomla) login attempt.
2020-09-17 19:06:37
180.149.126.213 attack
Found on   Alienvault    / proto=6  .  srcport=49572  .  dstport=8000  .     (1087)
2020-09-17 19:16:30
206.167.33.33 attackspam
Sep 17 12:01:12 santamaria sshd\[20868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.167.33.33  user=root
Sep 17 12:01:14 santamaria sshd\[20868\]: Failed password for root from 206.167.33.33 port 44864 ssh2
Sep 17 12:03:24 santamaria sshd\[20940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.167.33.33  user=root
...
2020-09-17 19:05:14
112.85.42.89 attackbots
Sep 16 19:11:11 PorscheCustomer sshd[29688]: Failed password for root from 112.85.42.89 port 18757 ssh2
Sep 16 19:13:51 PorscheCustomer sshd[29756]: Failed password for root from 112.85.42.89 port 47364 ssh2
Sep 16 19:13:54 PorscheCustomer sshd[29756]: Failed password for root from 112.85.42.89 port 47364 ssh2
...
2020-09-17 19:09:42
123.207.94.252 attackspam
2020-09-17T12:07:02.919043cyberdyne sshd[24270]: Invalid user shiori from 123.207.94.252 port 52093
2020-09-17T12:07:04.627539cyberdyne sshd[24270]: Failed password for invalid user shiori from 123.207.94.252 port 52093 ssh2
2020-09-17T12:11:49.751765cyberdyne sshd[25201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.94.252  user=root
2020-09-17T12:11:52.182016cyberdyne sshd[25201]: Failed password for root from 123.207.94.252 port 42904 ssh2
...
2020-09-17 18:40:56
91.185.212.7 attackbots
Found on   Binary Defense     / proto=6  .  srcport=57052  .  dstport=1433  .     (1088)
2020-09-17 19:14:18
143.255.53.45 attackspam
(smtpauth) Failed SMTP AUTH login from 143.255.53.45 (BR/Brazil/143.255.53.45.oxentenet.com.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-09-17 01:35:48 plain authenticator failed for ([143.255.53.45]) [143.255.53.45]: 535 Incorrect authentication data (set_id=m.erfanian)
2020-09-17 19:06:26
79.137.33.20 attack
k+ssh-bruteforce
2020-09-17 18:50:24
195.205.179.222 attack
$f2bV_matches
2020-09-17 18:53:29
36.78.137.61 attackspambots
Sep 17 10:31:20 email sshd\[7344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.78.137.61  user=root
Sep 17 10:31:22 email sshd\[7344\]: Failed password for root from 36.78.137.61 port 58326 ssh2
Sep 17 10:36:09 email sshd\[8155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.78.137.61  user=root
Sep 17 10:36:11 email sshd\[8155\]: Failed password for root from 36.78.137.61 port 60846 ssh2
Sep 17 10:41:06 email sshd\[8962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.78.137.61  user=root
...
2020-09-17 18:44:23
218.92.0.191 attackspam
Sep 17 12:26:32 srv-ubuntu-dev3 sshd[86950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.191  user=root
Sep 17 12:26:35 srv-ubuntu-dev3 sshd[86950]: Failed password for root from 218.92.0.191 port 47856 ssh2
Sep 17 12:26:37 srv-ubuntu-dev3 sshd[86950]: Failed password for root from 218.92.0.191 port 47856 ssh2
Sep 17 12:26:32 srv-ubuntu-dev3 sshd[86950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.191  user=root
Sep 17 12:26:35 srv-ubuntu-dev3 sshd[86950]: Failed password for root from 218.92.0.191 port 47856 ssh2
Sep 17 12:26:37 srv-ubuntu-dev3 sshd[86950]: Failed password for root from 218.92.0.191 port 47856 ssh2
Sep 17 12:26:32 srv-ubuntu-dev3 sshd[86950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.191  user=root
Sep 17 12:26:35 srv-ubuntu-dev3 sshd[86950]: Failed password for root from 218.92.0.191 port 47856 ssh2
Sep 17 12
...
2020-09-17 18:43:13
49.233.134.252 attack
fail2ban/Sep 17 12:46:50 h1962932 sshd[10019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.134.252  user=root
Sep 17 12:46:52 h1962932 sshd[10019]: Failed password for root from 49.233.134.252 port 33746 ssh2
Sep 17 12:53:08 h1962932 sshd[11678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.134.252  user=root
Sep 17 12:53:09 h1962932 sshd[11678]: Failed password for root from 49.233.134.252 port 38404 ssh2
Sep 17 12:55:19 h1962932 sshd[11934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.134.252  user=root
Sep 17 12:55:21 h1962932 sshd[11934]: Failed password for root from 49.233.134.252 port 60814 ssh2
2020-09-17 18:55:24
45.116.112.22 attack
Invalid user zapp from 45.116.112.22 port 51976
2020-09-17 19:08:10

Recently Reported IPs

81.9.101.233 82.11.29.44 232.155.126.203 135.114.242.98
141.144.42.84 68.100.70.32 98.132.51.139 221.245.208.210
101.27.156.176 188.141.183.219 125.179.252.200 165.115.142.82
67.31.248.204 137.203.117.195 33.240.102.1 113.80.13.9
16.131.201.242 209.13.44.19 96.98.222.9 138.170.245.172