Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tokyo

Region: Tokyo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.243.14.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63226
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.243.14.152.			IN	A

;; AUTHORITY SECTION:
.			507	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040102 1800 900 604800 86400

;; Query time: 95 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 02 10:39:28 CST 2020
;; MSG SIZE  rcvd: 117
Host info
152.14.243.49.in-addr.arpa domain name pointer 152.14.243.49.ap.yournet.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
152.14.243.49.in-addr.arpa	name = 152.14.243.49.ap.yournet.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
198.108.67.108 attackspam
Port scan denied
2020-05-16 17:17:18
216.126.231.15 attackspambots
May 16 01:44:55 powerpi2 sshd[28373]: Failed password for invalid user oracle from 216.126.231.15 port 49236 ssh2
May 16 01:53:09 powerpi2 sshd[28787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.126.231.15  user=root
May 16 01:53:11 powerpi2 sshd[28787]: Failed password for root from 216.126.231.15 port 51270 ssh2
...
2020-05-16 16:57:45
120.52.139.130 attackbots
$f2bV_matches
2020-05-16 17:31:20
139.99.84.85 attackbotsspam
May 16 10:47:43 web1 sshd[4818]: Invalid user celinepc from 139.99.84.85 port 36132
May 16 10:47:43 web1 sshd[4818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.84.85
May 16 10:47:43 web1 sshd[4818]: Invalid user celinepc from 139.99.84.85 port 36132
May 16 10:47:44 web1 sshd[4818]: Failed password for invalid user celinepc from 139.99.84.85 port 36132 ssh2
May 16 10:53:23 web1 sshd[6202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.84.85  user=root
May 16 10:53:25 web1 sshd[6202]: Failed password for root from 139.99.84.85 port 57468 ssh2
May 16 10:56:49 web1 sshd[7065]: Invalid user csgo-server from 139.99.84.85 port 56380
May 16 10:56:49 web1 sshd[7065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.84.85
May 16 10:56:49 web1 sshd[7065]: Invalid user csgo-server from 139.99.84.85 port 56380
May 16 10:56:51 web1 sshd[7065]: Failed pass
...
2020-05-16 17:25:29
207.154.215.119 attackspambots
May 16 05:47:15 pkdns2 sshd\[10903\]: Invalid user teamspeak from 207.154.215.119May 16 05:47:17 pkdns2 sshd\[10903\]: Failed password for invalid user teamspeak from 207.154.215.119 port 50768 ssh2May 16 05:51:27 pkdns2 sshd\[11080\]: Invalid user jesa from 207.154.215.119May 16 05:51:29 pkdns2 sshd\[11080\]: Failed password for invalid user jesa from 207.154.215.119 port 59958 ssh2May 16 05:55:59 pkdns2 sshd\[11283\]: Invalid user ovenfresh from 207.154.215.119May 16 05:56:01 pkdns2 sshd\[11283\]: Failed password for invalid user ovenfresh from 207.154.215.119 port 40920 ssh2
...
2020-05-16 17:35:30
192.99.11.195 attack
Invalid user juliet from 192.99.11.195 port 58844
2020-05-16 17:01:41
134.209.194.208 attackspambots
Too many connections or unauthorized access detected from Arctic banned ip
2020-05-16 17:29:19
200.219.235.34 attackspam
Invalid user ansible from 200.219.235.34 port 19564
2020-05-16 17:35:54
167.71.105.241 attackbots
*Port Scan* detected from 167.71.105.241 (US/United States/New Jersey/Clifton/-). 4 hits in the last 70 seconds
2020-05-16 17:05:30
202.98.248.123 attack
May 16 04:48:17 OPSO sshd\[3396\]: Invalid user bruno from 202.98.248.123 port 55596
May 16 04:48:17 OPSO sshd\[3396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.98.248.123
May 16 04:48:18 OPSO sshd\[3396\]: Failed password for invalid user bruno from 202.98.248.123 port 55596 ssh2
May 16 04:51:18 OPSO sshd\[4273\]: Invalid user jaimito from 202.98.248.123 port 45486
May 16 04:51:18 OPSO sshd\[4273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.98.248.123
2020-05-16 17:26:44
222.186.175.202 attackbots
May 16 04:55:48 ns381471 sshd[27783]: Failed password for root from 222.186.175.202 port 35546 ssh2
May 16 04:56:01 ns381471 sshd[27783]: error: maximum authentication attempts exceeded for root from 222.186.175.202 port 35546 ssh2 [preauth]
2020-05-16 17:35:14
104.248.192.145 attackbots
...
2020-05-16 17:06:13
139.186.71.224 attack
May 16 05:29:45 ift sshd\[18619\]: Failed password for invalid user admin from 139.186.71.224 port 50324 ssh2May 16 05:34:03 ift sshd\[19520\]: Invalid user yatri from 139.186.71.224May 16 05:34:04 ift sshd\[19520\]: Failed password for invalid user yatri from 139.186.71.224 port 42222 ssh2May 16 05:38:51 ift sshd\[20291\]: Invalid user ctxdemo from 139.186.71.224May 16 05:38:53 ift sshd\[20291\]: Failed password for invalid user ctxdemo from 139.186.71.224 port 34154 ssh2
...
2020-05-16 17:34:24
45.142.195.7 attack
Brute force attack
2020-05-16 16:56:44
45.142.195.15 attack
Brute force attack
2020-05-16 16:56:40

Recently Reported IPs

208.95.42.106 85.192.108.139 223.183.162.144 68.223.226.15
20.132.141.225 171.41.17.90 164.169.99.149 53.169.235.208
47.141.224.10 123.110.69.12 43.194.189.33 204.238.14.117
201.42.246.250 64.207.92.17 37.130.69.227 179.246.201.91
186.159.226.190 31.66.200.77 175.209.147.92 218.114.165.124