Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: Triple T Internet PCL

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbots
Lines containing failures of 49.49.245.103
Jan 17 13:48:06 shared05 sshd[8729]: Invalid user ubnt from 49.49.245.103 port 30995
Jan 17 13:48:07 shared05 sshd[8729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.49.245.103
Jan 17 13:48:08 shared05 sshd[8729]: Failed password for invalid user ubnt from 49.49.245.103 port 30995 ssh2
Jan 17 13:48:09 shared05 sshd[8729]: Connection closed by invalid user ubnt 49.49.245.103 port 30995 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.49.245.103
2020-01-17 22:02:11
Comments on same subnet:
IP Type Details Datetime
49.49.245.225 attackspambots
WordPress brute force
2020-08-25 05:37:17
49.49.245.40 attack
Unauthorized connection attempt from IP address 49.49.245.40 on Port 445(SMB)
2020-08-22 03:34:33
49.49.245.93 attackspambots
Unauthorised access (May 24) SRC=49.49.245.93 LEN=52 TTL=114 ID=15200 DF TCP DPT=445 WINDOW=8192 SYN
2020-05-25 04:29:23
49.49.245.84 attackspam
Invalid user admin from 49.49.245.84 port 51591
2020-05-23 12:31:17
49.49.245.78 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 16:33:34
49.49.245.71 attackbots
Unauthorized connection attempt detected from IP address 49.49.245.71 to port 445
2020-01-02 20:50:45
49.49.245.155 attack
Dec  1 12:05:11 nginx sshd[74095]: Invalid user admin from 49.49.245.155
Dec  1 12:05:11 nginx sshd[74095]: Connection closed by 49.49.245.155 port 59906 [preauth]
2019-12-01 20:56:41
49.49.245.132 attackbots
445/tcp
[2019-11-06]1pkt
2019-11-06 14:19:45
49.49.245.5 attackbotsspam
Sat, 20 Jul 2019 21:55:27 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 10:28:54
49.49.245.238 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-07-02 12:41:22
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.49.245.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6587
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.49.245.103.			IN	A

;; AUTHORITY SECTION:
.			422	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020011700 1800 900 604800 86400

;; Query time: 117 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 17 22:02:08 CST 2020
;; MSG SIZE  rcvd: 117
Host info
103.245.49.49.in-addr.arpa domain name pointer mx-ll-49.49.245-103.dynamic.3bb.in.th.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
103.245.49.49.in-addr.arpa	name = mx-ll-49.49.245-103.dynamic.3bb.co.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.21.191.10 attackspam
Banned for a week because repeated abuses, for example SSH, but not only
2020-10-09 20:23:12
45.129.33.5 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 34900 proto: tcp cat: Misc Attackbytes: 60
2020-10-09 20:18:30
192.144.129.181 attackbotsspam
Oct  9 13:39:01 inter-technics sshd[12971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.129.181  user=wow
Oct  9 13:39:03 inter-technics sshd[12971]: Failed password for wow from 192.144.129.181 port 55528 ssh2
Oct  9 13:44:22 inter-technics sshd[13427]: Invalid user jira from 192.144.129.181 port 57610
Oct  9 13:44:22 inter-technics sshd[13427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.129.181
Oct  9 13:44:22 inter-technics sshd[13427]: Invalid user jira from 192.144.129.181 port 57610
Oct  9 13:44:24 inter-technics sshd[13427]: Failed password for invalid user jira from 192.144.129.181 port 57610 ssh2
...
2020-10-09 20:15:00
103.206.250.211 attackspam
1602190141 - 10/08/2020 22:49:01 Host: 103.206.250.211/103.206.250.211 Port: 445 TCP Blocked
...
2020-10-09 20:28:06
187.107.68.86 attack
prod11
...
2020-10-09 20:24:00
80.162.1.98 attackbotsspam
web-1 [ssh] SSH Attack
2020-10-09 20:01:39
61.93.201.198 attackspam
SSH login attempts.
2020-10-09 20:03:24
46.187.1.37 attack
Unauthorized connection attempt from IP address 46.187.1.37 on Port 445(SMB)
2020-10-09 19:59:42
200.150.77.93 attack
Oct  9 11:09:58 pornomens sshd\[24767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.150.77.93  user=root
Oct  9 11:10:00 pornomens sshd\[24767\]: Failed password for root from 200.150.77.93 port 44403 ssh2
Oct  9 11:14:12 pornomens sshd\[24831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.150.77.93  user=root
...
2020-10-09 20:20:50
167.114.114.66 attackbotsspam
Oct  9 13:52:01 s1 sshd\[8775\]: Invalid user admin from 167.114.114.66 port 43562
Oct  9 13:52:01 s1 sshd\[8775\]: Failed password for invalid user admin from 167.114.114.66 port 43562 ssh2
Oct  9 14:08:36 s1 sshd\[13272\]: User mail from 167.114.114.66 not allowed because not listed in AllowUsers
Oct  9 14:08:36 s1 sshd\[13272\]: Failed password for invalid user mail from 167.114.114.66 port 52118 ssh2
Oct  9 14:15:23 s1 sshd\[18735\]: Invalid user minecraft from 167.114.114.66 port 50586
Oct  9 14:15:23 s1 sshd\[18735\]: Failed password for invalid user minecraft from 167.114.114.66 port 50586 ssh2
...
2020-10-09 20:26:16
176.216.134.36 attackbotsspam
TR - - [08/Oct/2020:22:23:58 +0300] "POST /xmlrpc.php HTTP/1.1" 200 441 "-" "-"
2020-10-09 20:10:11
122.51.134.202 attackspambots
$f2bV_matches
2020-10-09 19:52:55
112.124.32.163 attackspam
Oct  9 08:56:15 pornomens sshd\[22836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.124.32.163  user=root
Oct  9 08:56:17 pornomens sshd\[22836\]: Failed password for root from 112.124.32.163 port 35456 ssh2
Oct  9 08:57:29 pornomens sshd\[22845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.124.32.163  user=root
...
2020-10-09 20:10:49
92.62.131.106 attackbots
SIP/5060 Probe, BF, Hack -
2020-10-09 20:08:06
106.12.69.68 attackbotsspam
Found on 106.12.0.0/15    Dark List de    / proto=6  .  srcport=50370  .  dstport=4282  .     (1794)
2020-10-09 19:58:32

Recently Reported IPs

197.98.201.122 118.100.165.64 49.69.145.60 39.45.156.181
27.2.72.230 179.215.215.112 175.24.102.249 82.223.102.87
90.221.97.36 218.20.106.244 184.148.159.75 149.133.113.233
246.126.165.12 221.249.140.17 203.170.193.86 5.188.160.82
49.235.158.251 41.208.150.115 111.223.3.100 37.122.210.43