Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Philippines (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.148.50.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45077
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.148.50.193.			IN	A

;; AUTHORITY SECTION:
.			385	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023052400 1800 900 604800 86400

;; Query time: 133 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 24 15:52:01 CST 2023
;; MSG SIZE  rcvd: 106
Host info
193.50.148.49.in-addr.arpa domain name pointer dsl.49.148.50.193.pldt.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
193.50.148.49.in-addr.arpa	name = dsl.49.148.50.193.pldt.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
189.15.207.164 attack
2020-02-0620:55:561iznFj-0007G4-Un\<=verena@rs-solution.chH=\(localhost\)[113.177.134.102]:43992P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2268id=1613A5F6FD2907B4686D249C689E863F@rs-solution.chT="Iwantsomethingbeautiful"forluiscarrero@gmail.com2020-02-0620:56:181iznG5-0007Gv-T6\<=verena@rs-solution.chH=mx-ll-183.88.243-95.dynamic.3bb.co.th\(localhost\)[183.88.243.95]:57728P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2115id=6762D4878C5876C5191C55ED195A7CDF@rs-solution.chT="Iwantsomethingbeautiful"forlvortouni@gmail.com2020-02-0620:56:451iznGW-0007Hr-60\<=verena@rs-solution.chH=\(localhost\)[14.161.5.229]:60558P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2133id=B6B305565D89A714C8CD843CC812200D@rs-solution.chT="Iwantsomethingbeautiful"forraidergirl42557@yahoo.com2020-02-0620:55:311iznFK-0007F7-Lx\<=verena@rs-solution.chH=\(localhost\)[113.162.175.148]:52170P=e
2020-02-07 04:16:48
164.52.195.15 attackbots
Feb  6 10:39:47 ws22vmsma01 sshd[33027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.52.195.15
Feb  6 10:39:49 ws22vmsma01 sshd[33027]: Failed password for invalid user rtf from 164.52.195.15 port 48510 ssh2
...
2020-02-07 03:51:07
89.33.187.48 attack
Automatic report - Port Scan Attack
2020-02-07 04:05:41
114.239.104.99 attackspam
Brute force blocker - service: proftpd1, proftpd2 - aantal: 50 - Wed Jan 23 00:25:08 2019
2020-02-07 04:13:47
103.21.117.247 attack
Feb  6 16:34:20 server sshd\[2432\]: Invalid user aye from 103.21.117.247
Feb  6 16:34:20 server sshd\[2432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.21.117.247 
Feb  6 16:34:22 server sshd\[2432\]: Failed password for invalid user aye from 103.21.117.247 port 33800 ssh2
Feb  6 16:39:54 server sshd\[3363\]: Invalid user ljs from 103.21.117.247
Feb  6 16:39:54 server sshd\[3363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.21.117.247 
...
2020-02-07 03:49:12
49.89.164.156 attackspambots
Brute force blocker - service: proftpd1 - aantal: 125 - Mon Jan 21 01:50:08 2019
2020-02-07 04:17:40
212.83.183.39 attackbots
"Test Inject  un'a=0"
2020-02-07 04:29:19
163.178.170.13 attackbots
$f2bV_matches
2020-02-07 04:21:53
181.115.181.171 attack
Fail2Ban Ban Triggered
2020-02-07 03:58:43
112.85.42.173 attack
Feb  6 21:21:35 vmanager6029 sshd\[1991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
Feb  6 21:21:37 vmanager6029 sshd\[1991\]: Failed password for root from 112.85.42.173 port 1673 ssh2
Feb  6 21:21:40 vmanager6029 sshd\[1991\]: Failed password for root from 112.85.42.173 port 1673 ssh2
2020-02-07 04:25:15
80.227.12.38 attack
$f2bV_matches
2020-02-07 03:48:07
13.67.54.145 attackspambots
Feb  6 20:21:35 serwer sshd\[7183\]: Invalid user uvs from 13.67.54.145 port 44502
Feb  6 20:21:35 serwer sshd\[7183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.67.54.145
Feb  6 20:21:37 serwer sshd\[7183\]: Failed password for invalid user uvs from 13.67.54.145 port 44502 ssh2
...
2020-02-07 03:48:54
114.239.53.47 attack
Brute force blocker - service: proftpd1 - aantal: 41 - Wed Jan 16 10:30:08 2019
2020-02-07 04:24:53
2.36.136.146 attackspam
Feb  3 11:16:43 new sshd[15828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-2-36-136-146.cust.vodafonedsl.hostname
Feb  3 11:16:45 new sshd[15828]: Failed password for invalid user sawyer from 2.36.136.146 port 59902 ssh2
Feb  3 11:16:45 new sshd[15828]: Received disconnect from 2.36.136.146: 11: Bye Bye [preauth]
Feb  3 11:26:18 new sshd[18091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-2-36-136-146.cust.vodafonedsl.hostname
Feb  3 11:26:19 new sshd[18091]: Failed password for invalid user ghostname from 2.36.136.146 port 56498 ssh2
Feb  3 11:26:19 new sshd[18091]: Received disconnect from 2.36.136.146: 11: Bye Bye [preauth]
Feb  3 11:27:46 new sshd[18669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-2-36-136-146.cust.vodafonedsl.hostname
Feb  3 11:27:49 new sshd[18669]: Failed password for invalid user mcserver from 2.36.13........
-------------------------------
2020-02-07 04:26:02
70.113.242.156 attackbotsspam
$f2bV_matches
2020-02-07 03:59:27

Recently Reported IPs

100.22.244.46 85.97.87.242 218.37.22.46 33.13.132.74
201.67.171.207 57.126.71.67 54.28.19.72 136.166.172.109
73.175.217.225 73.95.18.82 174.26.161.195 192.166.77.25
152.231.255.253 153.146.96.65 218.235.113.181 93.123.43.50
118.51.249.173 27.71.10.198 64.167.63.176 180.93.50.133