Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Republic of China (ROC)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.213.233.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10788
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.213.233.149.			IN	A

;; AUTHORITY SECTION:
.			117	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 12:26:44 CST 2022
;; MSG SIZE  rcvd: 107
Host info
149.233.213.49.in-addr.arpa domain name pointer 149-233-213-49.tinp.net.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.233.213.49.in-addr.arpa	name = 149-233-213-49.tinp.net.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
58.37.214.154 attack
Invalid user sd from 58.37.214.154 port 37276
2020-05-20 14:45:19
94.24.229.218 attackspam
Honeypot attack, port: 81, PTR: pool-94-24-229-218is74.ru.
2020-05-20 14:13:41
190.196.64.93 attack
Invalid user yex from 190.196.64.93 port 52908
2020-05-20 14:37:43
60.190.159.42 attack
Unauthorized connection attempt detected from IP address 60.190.159.42 to port 445 [T]
2020-05-20 14:15:14
51.91.158.196 attack
May 20 06:25:35 vps687878 sshd\[31450\]: Failed password for invalid user vgi from 51.91.158.196 port 36008 ssh2
May 20 06:29:36 vps687878 sshd\[31839\]: Invalid user cqt from 51.91.158.196 port 42890
May 20 06:29:36 vps687878 sshd\[31839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.158.196
May 20 06:29:38 vps687878 sshd\[31839\]: Failed password for invalid user cqt from 51.91.158.196 port 42890 ssh2
May 20 06:33:30 vps687878 sshd\[32239\]: Invalid user zgv from 51.91.158.196 port 49772
May 20 06:33:30 vps687878 sshd\[32239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.158.196
...
2020-05-20 14:23:58
124.156.50.120 attackbots
Unauthorized connection attempt detected from IP address 124.156.50.120 to port 8003 [T]
2020-05-20 14:07:34
27.78.14.83 attackbots
SSH Brute-Force reported by Fail2Ban
2020-05-20 14:25:37
213.154.70.102 attackspam
Brute-force attempt banned
2020-05-20 14:33:05
185.14.187.133 attack
SSH brute-force attempt
2020-05-20 14:35:09
35.205.219.55 attackspam
Unauthorized connection attempt detected from IP address 35.205.219.55 to port 1935 [T]
2020-05-20 14:19:54
123.195.112.253 attackbotsspam
Unauthorized connection attempt detected from IP address 123.195.112.253 to port 80 [T]
2020-05-20 14:07:54
95.15.20.47 attackbotsspam
Port probing on unauthorized port 23
2020-05-20 14:43:58
185.232.65.36 attack
Port scan denied
2020-05-20 14:34:22
145.239.33.213 attackspambots
Invalid user asc from 145.239.33.213 port 33772
2020-05-20 14:45:56
164.68.100.252 attackspambots
Automatic report - WordPress Brute Force
2020-05-20 14:22:45

Recently Reported IPs

114.119.140.47 115.74.192.173 14.141.45.204 120.86.252.22
119.64.121.83 175.0.214.105 102.140.207.230 190.8.248.12
14.164.231.38 104.208.167.28 162.62.11.191 195.46.109.114
45.83.65.155 116.22.59.230 122.170.3.241 34.207.87.41
61.3.152.93 167.86.118.188 58.11.14.107 154.239.1.77