Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Philippines

Internet Service Provider: DSL

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspambots
Lines containing failures of 49.149.135.52
Nov 19 13:47:08 hvs sshd[22969]: Invalid user tech from 49.149.135.52 port 19607
Nov 19 13:47:09 hvs sshd[22969]: Connection closed by invalid user tech 49.149.135.52 port 19607 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.149.135.52
2019-11-19 22:45:35
Comments on same subnet:
IP Type Details Datetime
49.149.135.97 attackbots
Unauthorized connection attempt from IP address 49.149.135.97 on Port 445(SMB)
2020-08-22 00:57:58
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.149.135.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28619
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.149.135.52.			IN	A

;; AUTHORITY SECTION:
.			214	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019111900 1800 900 604800 86400

;; Query time: 581 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 19 22:45:32 CST 2019
;; MSG SIZE  rcvd: 117
Host info
52.135.149.49.in-addr.arpa domain name pointer dsl.49.149.135.52.pldt.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
52.135.149.49.in-addr.arpa	name = dsl.49.149.135.52.pldt.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
37.187.105.36 attack
Jun 18 16:00:40 abendstille sshd\[4834\]: Invalid user user4 from 37.187.105.36
Jun 18 16:00:40 abendstille sshd\[4834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.105.36
Jun 18 16:00:42 abendstille sshd\[4834\]: Failed password for invalid user user4 from 37.187.105.36 port 56406 ssh2
Jun 18 16:06:00 abendstille sshd\[9666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.105.36  user=root
Jun 18 16:06:02 abendstille sshd\[9666\]: Failed password for root from 37.187.105.36 port 56908 ssh2
...
2020-06-18 22:55:22
31.20.193.52 attack
Jun 18 15:37:31 sip sshd[5579]: Failed password for root from 31.20.193.52 port 56018 ssh2
Jun 18 15:45:26 sip sshd[8521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.20.193.52
Jun 18 15:45:28 sip sshd[8521]: Failed password for invalid user olt from 31.20.193.52 port 52520 ssh2
2020-06-18 23:00:25
104.248.187.165 attackbots
 TCP (SYN) 104.248.187.165:45452 -> port 13220, len 44
2020-06-18 22:28:17
123.206.62.112 attack
2020-06-18T10:00:24.1685111495-001 sshd[43335]: Failed password for invalid user administrator from 123.206.62.112 port 60189 ssh2
2020-06-18T10:05:59.5739471495-001 sshd[43561]: Invalid user caozheng from 123.206.62.112 port 57710
2020-06-18T10:05:59.5804041495-001 sshd[43561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.62.112
2020-06-18T10:05:59.5739471495-001 sshd[43561]: Invalid user caozheng from 123.206.62.112 port 57710
2020-06-18T10:06:01.5845791495-001 sshd[43561]: Failed password for invalid user caozheng from 123.206.62.112 port 57710 ssh2
2020-06-18T10:10:52.6351591495-001 sshd[43754]: Invalid user carmel from 123.206.62.112 port 55176
...
2020-06-18 22:44:54
211.57.153.250 attackbots
2020-06-18T13:50:37.253992abusebot-8.cloudsearch.cf sshd[19308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.57.153.250  user=root
2020-06-18T13:50:39.017254abusebot-8.cloudsearch.cf sshd[19308]: Failed password for root from 211.57.153.250 port 50931 ssh2
2020-06-18T13:57:10.372367abusebot-8.cloudsearch.cf sshd[19680]: Invalid user buero from 211.57.153.250 port 53103
2020-06-18T13:57:10.382438abusebot-8.cloudsearch.cf sshd[19680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.57.153.250
2020-06-18T13:57:10.372367abusebot-8.cloudsearch.cf sshd[19680]: Invalid user buero from 211.57.153.250 port 53103
2020-06-18T13:57:12.431896abusebot-8.cloudsearch.cf sshd[19680]: Failed password for invalid user buero from 211.57.153.250 port 53103 ssh2
2020-06-18T13:59:16.745770abusebot-8.cloudsearch.cf sshd[19784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.
...
2020-06-18 23:01:02
106.12.83.217 attackbots
Jun 18 14:09:40 scw-6657dc sshd[10702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.83.217
Jun 18 14:09:40 scw-6657dc sshd[10702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.83.217
Jun 18 14:09:42 scw-6657dc sshd[10702]: Failed password for invalid user moon from 106.12.83.217 port 34888 ssh2
...
2020-06-18 22:42:31
59.44.37.156 attackbots
06/18/2020-10:15:39.651875 59.44.37.156 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-06-18 22:33:59
203.162.54.246 attackspam
2020-06-18T07:07:38.716917morrigan.ad5gb.com sshd[951236]: Invalid user t from 203.162.54.246 port 34478
2020-06-18T07:07:40.879829morrigan.ad5gb.com sshd[951236]: Failed password for invalid user t from 203.162.54.246 port 34478 ssh2
2020-06-18T07:07:41.306984morrigan.ad5gb.com sshd[951236]: Disconnected from invalid user t 203.162.54.246 port 34478 [preauth]
2020-06-18 22:54:11
129.204.177.32 attack
Jun 18 15:54:08 h2779839 sshd[22079]: Invalid user ftptest1 from 129.204.177.32 port 46094
Jun 18 15:54:08 h2779839 sshd[22079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.177.32
Jun 18 15:54:08 h2779839 sshd[22079]: Invalid user ftptest1 from 129.204.177.32 port 46094
Jun 18 15:54:11 h2779839 sshd[22079]: Failed password for invalid user ftptest1 from 129.204.177.32 port 46094 ssh2
Jun 18 15:58:37 h2779839 sshd[22296]: Invalid user amos from 129.204.177.32 port 46500
Jun 18 15:58:37 h2779839 sshd[22296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.177.32
Jun 18 15:58:37 h2779839 sshd[22296]: Invalid user amos from 129.204.177.32 port 46500
Jun 18 15:58:38 h2779839 sshd[22296]: Failed password for invalid user amos from 129.204.177.32 port 46500 ssh2
Jun 18 16:03:15 h2779839 sshd[22445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.
...
2020-06-18 23:05:32
123.31.32.150 attackbotsspam
Jun 18 16:42:24 vps647732 sshd[13853]: Failed password for root from 123.31.32.150 port 42964 ssh2
Jun 18 16:45:40 vps647732 sshd[13974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.32.150
...
2020-06-18 22:57:25
2.230.51.94 attackspam
Unauthorized connection attempt detected from IP address 2.230.51.94 to port 23
2020-06-18 22:55:37
95.32.121.97 attack
ft-1848-fussball.de 95.32.121.97 [18/Jun/2020:16:17:19 +0200] "POST /xmlrpc.php HTTP/1.1" 200 496 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
ft-1848-fussball.de 95.32.121.97 [18/Jun/2020:16:17:23 +0200] "POST /xmlrpc.php HTTP/1.1" 200 496 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
2020-06-18 22:31:01
156.96.46.17 attackbots
Unauthorized connection attempt detected from IP address 156.96.46.17 to port 25 [T]
2020-06-18 22:24:00
218.92.0.191 attack
Jun 18 16:04:42 cdc sshd[15137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.191  user=root
Jun 18 16:04:45 cdc sshd[15137]: Failed password for invalid user root from 218.92.0.191 port 44444 ssh2
2020-06-18 23:05:10
195.54.160.228 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 34113 proto: TCP cat: Misc Attack
2020-06-18 22:37:57

Recently Reported IPs

41.114.91.44 159.89.129.55 186.224.11.24 201.132.83.7
58.71.213.75 5.156.184.242 58.248.191.43 125.231.8.217
46.153.81.72 168.121.97.209 49.169.92.62 170.238.54.15
94.222.223.176 45.249.80.131 156.0.141.218 151.53.216.115
105.158.15.147 195.158.24.52 181.49.132.18 105.226.131.30