Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: Triple T Internet PCL

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.49.41.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24268
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.49.41.148.			IN	A

;; AUTHORITY SECTION:
.			296	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120200 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 02 20:54:29 CST 2019
;; MSG SIZE  rcvd: 116
Host info
148.41.49.49.in-addr.arpa domain name pointer mx-ll-49.49.41-148.dynamic.3bb.in.th.
Nslookup info:
Server:		100.100.2.136
Address:	100.100.2.136#53

Non-authoritative answer:
148.41.49.49.in-addr.arpa	name = mx-ll-49.49.41-148.dynamic.3bb.in.th.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
180.145.24.44 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-02-28 19:29:31
125.167.114.219 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-28 19:31:41
194.186.184.190 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-28 19:05:34
185.175.93.19 attack
ET DROP Dshield Block Listed Source group 1 - port: 5935 proto: TCP cat: Misc Attack
2020-02-28 18:51:40
180.116.205.88 attack
Unauthorized connection attempt detected from IP address 180.116.205.88 to port 23
2020-02-28 19:14:45
218.166.32.193 attack
Honeypot attack, port: 5555, PTR: 218-166-32-193.dynamic-ip.hinet.net.
2020-02-28 18:58:29
206.189.72.217 attackbots
Feb 28 12:19:35 sso sshd[5501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.72.217
Feb 28 12:19:38 sso sshd[5501]: Failed password for invalid user zhucm from 206.189.72.217 port 38396 ssh2
...
2020-02-28 19:30:45
128.199.81.66 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-28 18:52:49
118.69.78.108 attackbotsspam
Unauthorized connection attempt from IP address 118.69.78.108 on Port 445(SMB)
2020-02-28 19:16:00
117.3.80.4 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-28 19:24:44
188.138.143.221 attackspam
Honeypot attack, port: 5555, PTR: 188-138-143-221.starnet.md.
2020-02-28 19:28:30
61.12.26.145 attackspambots
Feb 28 09:50:50 gw1 sshd[28708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.12.26.145
Feb 28 09:50:52 gw1 sshd[28708]: Failed password for invalid user ricochet from 61.12.26.145 port 49406 ssh2
...
2020-02-28 18:57:38
168.195.141.66 attackspam
W 31101,/var/log/nginx/access.log,-,-
2020-02-28 18:56:38
103.242.106.2 attackbotsspam
Feb 28 05:50:41 grey postfix/smtpd\[23504\]: NOQUEUE: reject: RCPT from unknown\[103.242.106.2\]: 554 5.7.1 Service unavailable\; Client host \[103.242.106.2\] blocked using bl.spamcop.net\; Blocked - see https://www.spamcop.net/bl.shtml\?103.242.106.2\; from=\ to=\ proto=ESMTP helo=\<\[103.242.106.2\]\>
...
2020-02-28 19:05:09
222.186.42.136 attackspam
Feb 28 11:53:39 ucs sshd\[1367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.136  user=root
Feb 28 11:53:41 ucs sshd\[1364\]: error: PAM: User not known to the underlying authentication module for root from 222.186.42.136
Feb 28 11:53:42 ucs sshd\[1370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.136  user=root
...
2020-02-28 19:02:38

Recently Reported IPs

103.243.87.45 107.197.229.149 144.171.15.117 6.199.108.120
126.185.68.88 126.46.2.13 71.36.229.240 38.35.3.74
58.189.74.118 188.160.131.19 156.153.26.43 178.76.52.13
183.83.132.36 36.65.68.229 186.201.29.114 14.162.144.49
110.39.65.211 106.75.72.100 182.52.11.54 31.223.81.67