Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.48.224.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52705
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.48.224.30.			IN	A

;; AUTHORITY SECTION:
.			249	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 11:29:10 CST 2022
;; MSG SIZE  rcvd: 105
Host info
30.224.48.49.in-addr.arpa domain name pointer mx-ll-49.48.224-30.dynamic.3bb.in.th.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
30.224.48.49.in-addr.arpa	name = mx-ll-49.48.224-30.dynamic.3bb.in.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.220.101.67 attack
Invalid user admin from 185.220.101.67 port 39851
2019-07-24 15:49:03
51.75.247.13 attackbots
Invalid user ubuntu from 51.75.247.13 port 56265
2019-07-24 16:08:36
221.160.100.14 attack
2019-07-24T07:38:30.203914abusebot-3.cloudsearch.cf sshd\[6455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.160.100.14  user=root
2019-07-24 15:38:36
37.187.62.31 attack
Invalid user prueba1 from 37.187.62.31 port 40989
2019-07-24 16:10:38
128.199.242.84 attack
Invalid user zimbra from 128.199.242.84 port 48556
2019-07-24 16:29:04
138.68.146.186 attack
Invalid user test from 138.68.146.186 port 35804
2019-07-24 15:58:11
3.215.54.41 attackspam
Jul 22 18:29:50 xb3 sshd[29213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-3-215-54-41.compute-1.amazonaws.com
Jul 22 18:29:52 xb3 sshd[29213]: Failed password for invalid user vtcbikes from 3.215.54.41 port 43912 ssh2
Jul 22 18:29:52 xb3 sshd[29213]: Received disconnect from 3.215.54.41: 11: Bye Bye [preauth]
Jul 22 18:58:23 xb3 sshd[23124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-3-215-54-41.compute-1.amazonaws.com
Jul 22 18:58:25 xb3 sshd[23124]: Failed password for invalid user matwork from 3.215.54.41 port 46608 ssh2
Jul 22 18:58:25 xb3 sshd[23124]: Received disconnect from 3.215.54.41: 11: Bye Bye [preauth]
Jul 22 19:03:14 xb3 sshd[20790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-3-215-54-41.compute-1.amazonaws.com
Jul 22 19:03:16 xb3 sshd[20790]: Failed password for invalid user alex from 3.215.54.41 port 43656 s........
-------------------------------
2019-07-24 16:12:16
189.125.2.234 attackspam
Invalid user rian from 189.125.2.234 port 51348
2019-07-24 15:46:38
196.1.99.12 attackspam
Invalid user postgres from 196.1.99.12 port 45324
2019-07-24 15:42:08
218.150.220.214 attack
Invalid user farah from 218.150.220.214 port 33226
2019-07-24 15:39:27
24.194.229.161 attackbotsspam
Invalid user pi from 24.194.229.161 port 56458
2019-07-24 16:11:41
222.120.192.114 attackspambots
Invalid user kate from 222.120.192.114 port 56226
2019-07-24 16:12:39
81.12.13.169 attack
Jul 24 09:30:15 rpi sshd[13038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.12.13.169 
Jul 24 09:30:17 rpi sshd[13038]: Failed password for invalid user noc from 81.12.13.169 port 37860 ssh2
2019-07-24 15:36:16
142.93.74.45 attackbotsspam
Invalid user one from 142.93.74.45 port 33672
2019-07-24 15:56:43
139.59.39.174 attackbotsspam
Invalid user jira from 139.59.39.174 port 36578
2019-07-24 15:57:30

Recently Reported IPs

49.37.39.44 49.49.13.223 49.37.33.229 49.49.0.178
49.48.244.224 49.49.221.209 49.49.217.247 49.49.217.215
49.65.164.11 49.67.19.69 49.49.90.66 49.64.55.141
49.65.120.14 49.66.204.131 49.49.247.53 49.69.208.70
49.69.130.203 49.69.130.224 49.49.244.237 49.70.55.164