Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: Triple T Internet PCL

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbotsspam
Sat, 20 Jul 2019 21:55:27 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 10:28:54
Comments on same subnet:
IP Type Details Datetime
49.49.245.225 attackspambots
WordPress brute force
2020-08-25 05:37:17
49.49.245.40 attack
Unauthorized connection attempt from IP address 49.49.245.40 on Port 445(SMB)
2020-08-22 03:34:33
49.49.245.93 attackspambots
Unauthorised access (May 24) SRC=49.49.245.93 LEN=52 TTL=114 ID=15200 DF TCP DPT=445 WINDOW=8192 SYN
2020-05-25 04:29:23
49.49.245.84 attackspam
Invalid user admin from 49.49.245.84 port 51591
2020-05-23 12:31:17
49.49.245.78 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 16:33:34
49.49.245.103 attackbots
Lines containing failures of 49.49.245.103
Jan 17 13:48:06 shared05 sshd[8729]: Invalid user ubnt from 49.49.245.103 port 30995
Jan 17 13:48:07 shared05 sshd[8729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.49.245.103
Jan 17 13:48:08 shared05 sshd[8729]: Failed password for invalid user ubnt from 49.49.245.103 port 30995 ssh2
Jan 17 13:48:09 shared05 sshd[8729]: Connection closed by invalid user ubnt 49.49.245.103 port 30995 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.49.245.103
2020-01-17 22:02:11
49.49.245.71 attackbots
Unauthorized connection attempt detected from IP address 49.49.245.71 to port 445
2020-01-02 20:50:45
49.49.245.155 attack
Dec  1 12:05:11 nginx sshd[74095]: Invalid user admin from 49.49.245.155
Dec  1 12:05:11 nginx sshd[74095]: Connection closed by 49.49.245.155 port 59906 [preauth]
2019-12-01 20:56:41
49.49.245.132 attackbots
445/tcp
[2019-11-06]1pkt
2019-11-06 14:19:45
49.49.245.238 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-07-02 12:41:22
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.49.245.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56938
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.49.245.5.			IN	A

;; AUTHORITY SECTION:
.			1773	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072001 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 21 10:28:42 CST 2019
;; MSG SIZE  rcvd: 115
Host info
5.245.49.49.in-addr.arpa domain name pointer mx-ll-49.49.245-5.dynamic.3bb.in.th.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
5.245.49.49.in-addr.arpa	name = mx-ll-49.49.245-5.dynamic.3bb.in.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.235.158.195 attackbots
...
2020-09-07 22:08:25
112.242.181.81 attack
20/9/7@06:34:21: FAIL: Alarm-Telnet address from=112.242.181.81
...
2020-09-07 22:14:35
89.109.35.233 attack
Honeypot attack, port: 445, PTR: 89-109-35-233.static.mts-nn.ru.
2020-09-07 22:12:04
41.45.16.155 attackspambots
Telnet Server BruteForce Attack
2020-09-07 22:02:32
222.186.30.76 attackspambots
Sep  7 09:44:28 NPSTNNYC01T sshd[6886]: Failed password for root from 222.186.30.76 port 15705 ssh2
Sep  7 09:44:31 NPSTNNYC01T sshd[6886]: Failed password for root from 222.186.30.76 port 15705 ssh2
Sep  7 09:44:34 NPSTNNYC01T sshd[6886]: Failed password for root from 222.186.30.76 port 15705 ssh2
...
2020-09-07 21:47:27
49.128.174.248 attackbots
Honeypot attack, port: 445, PTR: 49.128.174-248.static-mumbai.wnet.net.in.
2020-09-07 21:48:16
222.186.173.215 attackspam
Sep  7 14:03:57 scw-6657dc sshd[1193]: Failed password for root from 222.186.173.215 port 51406 ssh2
Sep  7 14:03:57 scw-6657dc sshd[1193]: Failed password for root from 222.186.173.215 port 51406 ssh2
Sep  7 14:04:00 scw-6657dc sshd[1193]: Failed password for root from 222.186.173.215 port 51406 ssh2
...
2020-09-07 22:12:26
176.92.193.227 attack
Telnet Server BruteForce Attack
2020-09-07 21:54:26
69.114.116.254 attack
Honeypot attack, port: 5555, PTR: ool-457274fe.dyn.optonline.net.
2020-09-07 22:08:09
106.12.70.118 attackspambots
SSH login attempts.
2020-09-07 21:57:04
14.242.116.132 attackbots
20/9/6@20:29:03: FAIL: Alarm-Network address from=14.242.116.132
20/9/6@20:29:03: FAIL: Alarm-Network address from=14.242.116.132
...
2020-09-07 21:48:38
45.227.255.206 attackspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-07T12:45:15Z and 2020-09-07T13:00:17Z
2020-09-07 22:00:46
46.148.96.202 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-07 22:23:19
43.245.198.226 attack
$f2bV_matches
2020-09-07 22:16:24
87.1.81.21 attack
2020-09-06T18:53:31.109454 X postfix/smtpd[172461]: NOQUEUE: reject: RCPT from host-87-1-81-21.retail.telecomitalia.it[87.1.81.21]: 554 5.7.1 Service unavailable; Client host [87.1.81.21] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/87.1.81.21; from= to= proto=ESMTP helo=
2020-09-07 21:46:34

Recently Reported IPs

218.161.113.50 125.167.130.117 124.123.75.41 5.54.91.195
200.96.78.102 180.251.236.169 80.38.218.134 59.91.193.242
37.111.130.189 178.221.234.169 176.100.191.79 119.252.170.138
113.22.176.82 190.79.97.227 154.126.166.85 125.163.119.34
113.161.167.11 39.45.235.140 221.162.255.86 209.163.163.80