Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Philippines (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.149.155.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48235
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.149.155.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 22:42:06 CST 2025
;; MSG SIZE  rcvd: 106
Host info
80.155.149.49.in-addr.arpa domain name pointer dsl.49.149.155.80.pldt.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.155.149.49.in-addr.arpa	name = dsl.49.149.155.80.pldt.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
186.71.57.18 attack
Sep  8 17:13:44 aiointranet sshd\[31127\]: Invalid user ftpadmin from 186.71.57.18
Sep  8 17:13:44 aiointranet sshd\[31127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.71.57.18
Sep  8 17:13:46 aiointranet sshd\[31127\]: Failed password for invalid user ftpadmin from 186.71.57.18 port 40216 ssh2
Sep  8 17:20:47 aiointranet sshd\[31754\]: Invalid user kerapetse from 186.71.57.18
Sep  8 17:20:47 aiointranet sshd\[31754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.71.57.18
2019-09-09 11:25:20
178.208.91.34 attackspam
Wordpress Admin Login attack
2019-09-09 10:53:50
185.60.88.110 attackbotsspam
Sep  9 05:17:27 core sshd[24235]: Invalid user git from 185.60.88.110 port 49088
Sep  9 05:17:28 core sshd[24235]: Failed password for invalid user git from 185.60.88.110 port 49088 ssh2
...
2019-09-09 11:32:55
192.42.116.15 attackspam
2019-08-15T15:28:52.636101wiz-ks3 sshd[9906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=this-is-a-tor-exit-node-hviv115.hviv.nl  user=root
2019-08-15T15:28:54.629931wiz-ks3 sshd[9906]: Failed password for root from 192.42.116.15 port 40998 ssh2
2019-08-15T15:28:57.697243wiz-ks3 sshd[9906]: Failed password for root from 192.42.116.15 port 40998 ssh2
2019-08-15T15:28:52.636101wiz-ks3 sshd[9906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=this-is-a-tor-exit-node-hviv115.hviv.nl  user=root
2019-08-15T15:28:54.629931wiz-ks3 sshd[9906]: Failed password for root from 192.42.116.15 port 40998 ssh2
2019-08-15T15:28:57.697243wiz-ks3 sshd[9906]: Failed password for root from 192.42.116.15 port 40998 ssh2
2019-08-15T15:28:52.636101wiz-ks3 sshd[9906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=this-is-a-tor-exit-node-hviv115.hviv.nl  user=root
2019-08-15T15:28:54.629931wiz-ks3 sshd[9906]:
2019-09-09 11:01:12
114.33.207.200 attackspambots
52869/tcp 23/tcp...
[2019-07-23/09-08]4pkt,2pt.(tcp)
2019-09-09 10:57:59
92.118.37.74 attackspam
Sep  9 04:52:11 h2177944 kernel: \[874080.887960\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.74 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=52638 PROTO=TCP SPT=46525 DPT=37607 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep  9 04:55:27 h2177944 kernel: \[874277.207128\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.74 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=17196 PROTO=TCP SPT=46525 DPT=49076 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep  9 04:58:49 h2177944 kernel: \[874479.123292\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.74 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=50548 PROTO=TCP SPT=46525 DPT=53897 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep  9 04:59:03 h2177944 kernel: \[874492.873512\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.74 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=35660 PROTO=TCP SPT=46525 DPT=52170 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep  9 04:59:50 h2177944 kernel: \[874539.727034\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.74 DST=85.214.117.9 LEN=4
2019-09-09 10:59:56
188.213.42.107 attackbots
port scan/probe/communication attempt
2019-09-09 11:28:56
175.144.148.249 attackbots
UTC: 2019-09-08 port: 23/tcp
2019-09-09 11:11:38
60.215.38.81 attack
2323/tcp 23/tcp 23/tcp
[2019-08-04/09-08]3pkt
2019-09-09 10:56:19
188.93.234.85 attack
Sep  8 11:13:45 friendsofhawaii sshd\[16270\]: Invalid user admin from 188.93.234.85
Sep  8 11:13:45 friendsofhawaii sshd\[16270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.93.234.85
Sep  8 11:13:47 friendsofhawaii sshd\[16270\]: Failed password for invalid user admin from 188.93.234.85 port 49798 ssh2
Sep  8 11:20:05 friendsofhawaii sshd\[16748\]: Invalid user sinusbot from 188.93.234.85
Sep  8 11:20:05 friendsofhawaii sshd\[16748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.93.234.85
2019-09-09 11:01:38
77.247.110.216 attack
5080/udp 6090/udp 5085/udp...
[2019-07-09/09-07]289pkt,11pt.(udp)
2019-09-09 11:12:53
138.68.101.199 attackspambots
Sep  8 23:06:40 server sshd\[8616\]: Invalid user bot123 from 138.68.101.199 port 51876
Sep  8 23:06:40 server sshd\[8616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.101.199
Sep  8 23:06:42 server sshd\[8616\]: Failed password for invalid user bot123 from 138.68.101.199 port 51876 ssh2
Sep  8 23:10:11 server sshd\[28076\]: Invalid user a from 138.68.101.199 port 37498
Sep  8 23:10:11 server sshd\[28076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.101.199
2019-09-09 11:00:12
14.63.223.226 attackspambots
Sep  9 00:00:40 saschabauer sshd[14711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.223.226
Sep  9 00:00:42 saschabauer sshd[14711]: Failed password for invalid user admin from 14.63.223.226 port 49526 ssh2
2019-09-09 11:18:07
37.187.100.54 attackspambots
Sep  9 03:13:33 game-panel sshd[5362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.100.54
Sep  9 03:13:35 game-panel sshd[5362]: Failed password for invalid user 123456 from 37.187.100.54 port 39664 ssh2
Sep  9 03:20:20 game-panel sshd[5595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.100.54
2019-09-09 11:20:42
218.98.40.153 attack
19/9/8@22:59:33: FAIL: Alarm-SSH address from=218.98.40.153
...
2019-09-09 11:16:53

Recently Reported IPs

161.25.225.91 167.136.172.34 149.223.125.187 20.164.100.99
155.122.170.132 69.67.38.165 59.130.146.253 5.102.10.134
195.236.156.49 95.138.97.221 206.87.245.93 190.185.124.53
78.103.124.57 201.215.84.209 123.138.124.146 60.214.223.149
160.84.137.192 192.247.41.169 193.236.116.22 219.155.42.140