Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.49.222.115
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32707
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.49.222.115.			IN	A

;; AUTHORITY SECTION:
.			230	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 11:58:30 CST 2022
;; MSG SIZE  rcvd: 106
Host info
115.222.49.49.in-addr.arpa domain name pointer mx-ll-49.49.222-115.dynamic.3bb.co.th.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
115.222.49.49.in-addr.arpa	name = mx-ll-49.49.222-115.dynamic.3bb.co.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.134.179.57 attack
May 21 10:39:25 debian-2gb-nbg1-2 kernel: \[12309188.133064\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.134.179.57 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=24414 PROTO=TCP SPT=53294 DPT=1297 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-21 16:56:52
119.29.205.52 attack
May 21 06:26:40 inter-technics sshd[27438]: Invalid user qem from 119.29.205.52 port 37940
May 21 06:26:40 inter-technics sshd[27438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.205.52
May 21 06:26:40 inter-technics sshd[27438]: Invalid user qem from 119.29.205.52 port 37940
May 21 06:26:42 inter-technics sshd[27438]: Failed password for invalid user qem from 119.29.205.52 port 37940 ssh2
May 21 06:32:16 inter-technics sshd[2393]: Invalid user nvk from 119.29.205.52 port 60544
...
2020-05-21 17:18:21
113.185.46.36 attackbotsspam
May 21 05:52:03 web01 sshd[21020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.185.46.36 
May 21 05:52:05 web01 sshd[21020]: Failed password for invalid user 888888 from 113.185.46.36 port 47285 ssh2
...
2020-05-21 17:10:53
134.209.186.72 attackbots
2020-05-21T04:14:52.228540mail.thespaminator.com sshd[13174]: Invalid user wlt from 134.209.186.72 port 41158
2020-05-21T04:14:54.092150mail.thespaminator.com sshd[13174]: Failed password for invalid user wlt from 134.209.186.72 port 41158 ssh2
...
2020-05-21 17:29:18
85.106.74.156 attack
Excessive Port-Scanning
2020-05-21 17:01:10
185.220.100.249 attack
May 21 03:51:41 ssh2 sshd[97531]: User root from tor-exit-10.zbau.f3netze.de not allowed because not listed in AllowUsers
May 21 03:51:41 ssh2 sshd[97531]: Failed password for invalid user root from 185.220.100.249 port 32996 ssh2
May 21 03:51:42 ssh2 sshd[97531]: Failed password for invalid user root from 185.220.100.249 port 32996 ssh2
...
2020-05-21 17:24:00
169.239.128.152 attackbots
May 21 06:31:25 vps sshd[756840]: Failed password for invalid user uex from 169.239.128.152 port 50486 ssh2
May 21 06:36:14 vps sshd[779701]: Invalid user lrd from 169.239.128.152 port 52880
May 21 06:36:14 vps sshd[779701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=169.239.128.152
May 21 06:36:16 vps sshd[779701]: Failed password for invalid user lrd from 169.239.128.152 port 52880 ssh2
May 21 06:41:10 vps sshd[803702]: Invalid user zxx from 169.239.128.152 port 56300
...
2020-05-21 17:05:18
148.70.128.197 attack
May 21 09:22:14 OPSO sshd\[1318\]: Invalid user ssh from 148.70.128.197 port 50838
May 21 09:22:14 OPSO sshd\[1318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.128.197
May 21 09:22:16 OPSO sshd\[1318\]: Failed password for invalid user ssh from 148.70.128.197 port 50838 ssh2
May 21 09:26:04 OPSO sshd\[1902\]: Invalid user grq from 148.70.128.197 port 36778
May 21 09:26:04 OPSO sshd\[1902\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.128.197
2020-05-21 17:00:03
195.54.160.123 normal
function=call_user_func_array
2020-05-21 16:55:01
95.85.12.122 attackspam
Port scan(s) [2 denied]
2020-05-21 16:56:01
45.119.83.210 attackbotsspam
Lines containing failures of 45.119.83.210 (max 1000)
May 20 08:50:37 archiv sshd[32202]: Invalid user sunyufei from 45.119.83.210 port 37982
May 20 08:50:37 archiv sshd[32202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.83.210
May 20 08:50:39 archiv sshd[32202]: Failed password for invalid user sunyufei from 45.119.83.210 port 37982 ssh2
May 20 08:50:39 archiv sshd[32202]: Received disconnect from 45.119.83.210 port 37982:11: Bye Bye [preauth]
May 20 08:50:39 archiv sshd[32202]: Disconnected from 45.119.83.210 port 37982 [preauth]
May 20 09:03:04 archiv sshd[32467]: Invalid user pnr from 45.119.83.210 port 53002
May 20 09:03:04 archiv sshd[32467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.83.210
May 20 09:03:06 archiv sshd[32467]: Failed password for invalid user pnr from 45.119.83.210 port 53002 ssh2
May 20 09:03:07 archiv sshd[32467]: Received disconnect from 45.11........
------------------------------
2020-05-21 16:58:22
51.91.100.109 attack
Invalid user vrs from 51.91.100.109 port 55986
2020-05-21 17:25:08
50.63.92.69 attackbots
Scanning for exploits - /shop/wp-includes/wlwmanifest.xml
2020-05-21 17:08:00
222.186.180.142 attack
May 21 05:16:18 NPSTNNYC01T sshd[4705]: Failed password for root from 222.186.180.142 port 48498 ssh2
May 21 05:16:27 NPSTNNYC01T sshd[4716]: Failed password for root from 222.186.180.142 port 22232 ssh2
...
2020-05-21 17:26:33
171.4.117.176 attack
Host Scan
2020-05-21 17:27:26

Recently Reported IPs

31.135.99.166 37.114.194.53 45.66.208.167 49.118.165.27
106.250.141.211 182.53.186.157 119.51.159.143 113.125.78.36
183.166.138.136 109.236.51.188 80.73.74.54 178.130.188.144
167.58.20.179 103.84.175.193 77.247.110.159 193.151.128.27
45.236.170.185 168.90.90.125 212.119.41.94 108.177.248.57