Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Pattaya

Region: Changwat Chon Buri

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: Triple T Internet/Triple T Broadband

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
49.48.51.197 attackbots
1585972515 - 04/04/2020 05:55:15 Host: 49.48.51.197/49.48.51.197 Port: 445 TCP Blocked
2020-04-04 15:43:40
49.48.51.95 attackbotsspam
port 23
2019-12-15 06:07:03
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.48.51.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25596
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.48.51.139.			IN	A

;; AUTHORITY SECTION:
.			558	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062801 1800 900 604800 86400

;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 29 03:21:34 CST 2019
;; MSG SIZE  rcvd: 116

Host info
139.51.48.49.in-addr.arpa has no PTR record
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 139.51.48.49.in-addr.arpa.: No answer

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
149.202.160.188 attack
reported through recidive - multiple failed attempts(SSH)
2020-09-17 00:11:35
141.98.10.209 attackspam
Sep 16 17:43:34 vps647732 sshd[28682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.209
Sep 16 17:43:35 vps647732 sshd[28682]: Failed password for invalid user 1234 from 141.98.10.209 port 59066 ssh2
...
2020-09-16 23:48:53
2.132.254.54 attack
$f2bV_matches
2020-09-16 23:51:15
141.98.10.212 attackbotsspam
Sep 16 17:43:21 vps647732 sshd[28654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.212
Sep 16 17:43:23 vps647732 sshd[28654]: Failed password for invalid user Administrator from 141.98.10.212 port 44579 ssh2
...
2020-09-17 00:02:17
5.188.210.18 attackbotsspam
Unauthorized access detected from black listed ip!
2020-09-17 00:18:06
27.5.31.71 attackbotsspam
1600189116 - 09/15/2020 18:58:36 Host: 27.5.31.71/27.5.31.71 Port: 23 TCP Blocked
2020-09-17 00:06:09
187.136.77.116 attackspam
Icarus honeypot on github
2020-09-16 23:59:29
104.244.74.169 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-16 23:56:12
111.229.60.6 attackspam
111.229.60.6 (CN/China/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 16 06:35:28 server2 sshd[20650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.7.200.113  user=root
Sep 16 06:35:14 server2 sshd[20434]: Failed password for root from 180.76.161.77 port 49142 ssh2
Sep 16 06:35:29 server2 sshd[20650]: Failed password for root from 193.7.200.113 port 41416 ssh2
Sep 16 06:35:29 server2 sshd[20653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.60.6  user=root
Sep 16 06:35:30 server2 sshd[20657]: Failed password for root from 51.68.198.113 port 57644 ssh2

IP Addresses Blocked:

193.7.200.113 (GB/United Kingdom/-)
180.76.161.77 (CN/China/-)
2020-09-17 00:29:53
182.52.70.202 attack
Sep 16 05:44:33 r.ca sshd[7656]: Failed password for root from 182.52.70.202 port 38404 ssh2
2020-09-16 23:53:21
58.250.89.46 attack
58.250.89.46 (CN/China/-), 3 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 16 10:12:31 honeypot sshd[113308]: Failed password for root from 58.250.89.46 port 50054 ssh2
Sep 16 10:19:00 honeypot sshd[113392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.172.66.227  user=root
Sep 16 10:12:29 honeypot sshd[113308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.250.89.46  user=root

IP Addresses Blocked:
2020-09-17 00:00:18
159.89.194.103 attackbots
Sep 16 15:27:21 minden010 sshd[28600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.194.103
Sep 16 15:27:23 minden010 sshd[28600]: Failed password for invalid user neske from 159.89.194.103 port 39782 ssh2
Sep 16 15:30:05 minden010 sshd[29487]: Failed password for root from 159.89.194.103 port 48654 ssh2
...
2020-09-17 00:11:14
75.130.124.90 attackspam
(sshd) Failed SSH login from 75.130.124.90 (US/United States/075-130-124-090.biz.spectrum.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 16 15:02:49 amsweb01 sshd[29255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.130.124.90  user=root
Sep 16 15:02:51 amsweb01 sshd[29255]: Failed password for root from 75.130.124.90 port 24854 ssh2
Sep 16 15:18:37 amsweb01 sshd[31681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.130.124.90  user=root
Sep 16 15:18:39 amsweb01 sshd[31681]: Failed password for root from 75.130.124.90 port 34193 ssh2
Sep 16 15:22:49 amsweb01 sshd[32363]: Invalid user nicolas from 75.130.124.90 port 40229
2020-09-17 00:10:22
185.234.63.126 attack
Automatic report - Port Scan Attack
2020-09-17 00:09:46
190.145.254.138 attack
Invalid user kristofvps from 190.145.254.138 port 28419
2020-09-16 23:57:43

Recently Reported IPs

41.155.200.37 191.42.223.110 192.168.20.2 68.177.24.68
1.175.163.81 171.112.160.0 168.194.157.76 26.208.60.253
191.19.157.3 94.78.212.214 25.77.3.35 36.229.250.175
230.9.133.47 125.76.246.46 190.33.204.43 14.232.208.200
223.79.108.76 182.115.250.175 119.236.143.7 46.241.159.181