Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.49.22.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62206
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.49.22.239.			IN	A

;; AUTHORITY SECTION:
.			211	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010702 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 08 11:42:50 CST 2022
;; MSG SIZE  rcvd: 105
Host info
239.22.49.49.in-addr.arpa domain name pointer mx-ll-49.49.22-239.dynamic.3bb.in.th.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
239.22.49.49.in-addr.arpa	name = mx-ll-49.49.22-239.dynamic.3bb.in.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
52.187.68.164 attackbots
<6 unauthorized SSH connections
2020-09-24 17:18:49
58.65.205.154 attackbots
Unauthorized connection attempt from IP address 58.65.205.154 on Port 445(SMB)
2020-09-24 16:54:18
223.139.162.142 attackbotsspam
Sep 23 14:01:49 logopedia-1vcpu-1gb-nyc1-01 sshd[126930]: Invalid user netman from 223.139.162.142 port 19716
...
2020-09-24 16:45:13
114.27.121.209 attackbots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-24 17:04:02
103.48.192.48 attack
Auto Fail2Ban report, multiple SSH login attempts.
2020-09-24 17:18:19
200.250.2.242 attack
Unauthorized connection attempt from IP address 200.250.2.242 on Port 445(SMB)
2020-09-24 16:47:03
61.224.41.163 attackbots
Sep 23 23:02:26 ssh2 sshd[25252]: User root from 61-224-41-163.dynamic-ip.hinet.net not allowed because not listed in AllowUsers
Sep 23 23:02:27 ssh2 sshd[25252]: Failed password for invalid user root from 61.224.41.163 port 60368 ssh2
Sep 23 23:02:29 ssh2 sshd[25252]: Connection closed by invalid user root 61.224.41.163 port 60368 [preauth]
...
2020-09-24 16:44:43
42.3.120.202 attackspam
Automatic report - Banned IP Access
2020-09-24 17:11:05
221.124.120.214 attackbots
Sep 22 09:00:46 roki-contabo sshd\[14703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.124.120.214  user=root
Sep 22 09:00:48 roki-contabo sshd\[14703\]: Failed password for root from 221.124.120.214 port 56429 ssh2
Sep 22 16:01:21 roki-contabo sshd\[19003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.124.120.214  user=root
Sep 22 16:01:23 roki-contabo sshd\[19003\]: Failed password for root from 221.124.120.214 port 40869 ssh2
Sep 22 21:07:36 roki-contabo sshd\[21866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.124.120.214  user=root
...
2020-09-24 17:05:13
65.49.20.96 attackspambots
Found on   Github Combined on 3 lists    / proto=17  .  srcport=53042  .  dstport=443  .     (2875)
2020-09-24 16:57:36
78.189.215.202 attackspam
Unauthorized connection attempt from IP address 78.189.215.202 on Port 445(SMB)
2020-09-24 16:39:40
78.186.57.151 attack
Unauthorized connection attempt from IP address 78.186.57.151 on Port 445(SMB)
2020-09-24 17:08:06
58.19.83.160 attackspam
Brute forcing email accounts
2020-09-24 16:54:47
68.183.80.42 attackbotsspam
Sep 24 07:32:40 localhost sshd\[18839\]: Invalid user sonarqube from 68.183.80.42 port 54098
Sep 24 07:32:40 localhost sshd\[18839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.80.42
Sep 24 07:32:42 localhost sshd\[18839\]: Failed password for invalid user sonarqube from 68.183.80.42 port 54098 ssh2
...
2020-09-24 16:53:50
79.35.62.201 attack
Brute-force attempt banned
2020-09-24 16:41:07

Recently Reported IPs

56.93.246.217 3.67.214.142 148.217.3.162 30.95.224.88
60.87.80.107 59.107.174.66 32.222.96.26 217.87.158.89
153.70.201.158 32.37.93.223 34.163.0.120 47.252.63.235
34.41.68.219 181.215.63.199 199.235.0.246 35.1.107.240
50.182.179.69 161.41.154.208 35.167.1.136 106.176.14.230