Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
49.49.45.28 attackbotsspam
Unauthorized connection attempt from IP address 49.49.45.28 on Port 445(SMB)
2020-08-31 23:32:50
49.49.45.89 attackbots
Unauthorised access (Aug  7) SRC=49.49.45.89 LEN=52 TOS=0x10 PREC=0x40 TTL=113 ID=10200 DF TCP DPT=445 WINDOW=8192 SYN
2020-08-07 14:50:50
49.49.45.237 attackspambots
Mar 10 10:07:38 pl3server sshd[32621]: Did not receive identification string from 49.49.45.237
Mar 10 10:07:45 pl3server sshd[352]: reveeclipse mapping checking getaddrinfo for mx-ll-49.49.45-237.dynamic.3bb.co.th [49.49.45.237] failed - POSSIBLE BREAK-IN ATTEMPT!
Mar 10 10:07:45 pl3server sshd[352]: Invalid user nagesh from 49.49.45.237
Mar 10 10:07:45 pl3server sshd[352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.49.45.237


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.49.45.237
2020-03-10 22:19:08
49.49.45.220 attack
firewall-block, port(s): 26/tcp
2019-11-30 15:17:28
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.49.45.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5498
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.49.45.86.			IN	A

;; AUTHORITY SECTION:
.			121	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091502 1800 900 604800 86400

;; Query time: 391 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 16 12:07:39 CST 2022
;; MSG SIZE  rcvd: 104
Host info
86.45.49.49.in-addr.arpa domain name pointer mx-ll-49.49.45-86.dynamic.3bb.co.th.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
86.45.49.49.in-addr.arpa	name = mx-ll-49.49.45-86.dynamic.3bb.in.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
27.48.138.8 attackbots
Unauthorised access (Jan 28) SRC=27.48.138.8 LEN=40 TTL=248 ID=54595 TCP DPT=445 WINDOW=1024 SYN
2020-01-28 17:12:17
103.71.50.204 attackbots
Unauthorized connection attempt detected from IP address 103.71.50.204 to port 80 [J]
2020-01-28 16:44:25
187.178.75.175 attackbotsspam
unauthorized connection attempt
2020-01-28 17:02:20
103.221.208.167 attack
unauthorized connection attempt
2020-01-28 16:57:13
203.171.227.205 attack
Sep 23 00:32:59 dallas01 sshd[18656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.171.227.205
Sep 23 00:33:02 dallas01 sshd[18656]: Failed password for invalid user wwwroot from 203.171.227.205 port 57265 ssh2
Sep 23 00:37:32 dallas01 sshd[19451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.171.227.205
Sep 23 00:37:34 dallas01 sshd[19451]: Failed password for invalid user len4ik123 from 203.171.227.205 port 42684 ssh2
2020-01-28 17:16:37
189.44.212.178 attackspam
Scanning random ports - tries to find possible vulnerable services
2020-01-28 17:01:49
201.47.230.152 attack
unauthorized connection attempt
2020-01-28 16:53:15
196.37.111.170 attack
Unauthorized connection attempt detected from IP address 196.37.111.170 to port 1433 [J]
2020-01-28 16:40:17
113.12.227.122 attackbotsspam
Unauthorized connection attempt detected from IP address 113.12.227.122 to port 6380 [J]
2020-01-28 17:06:24
54.39.98.253 attack
Invalid user test3 from 54.39.98.253 port 38384
2020-01-28 17:09:12
156.223.140.244 attackbotsspam
Unauthorized connection attempt detected from IP address 156.223.140.244 to port 23 [J]
2020-01-28 16:41:13
78.29.19.20 attackbotsspam
Unauthorized connection attempt from IP address 78.29.19.20 on Port 445(SMB)
2020-01-28 17:08:11
82.202.81.2 attackbotsspam
unauthorized connection attempt
2020-01-28 16:46:52
221.127.13.24 attackspambots
unauthorized connection attempt
2020-01-28 16:59:48
94.138.151.51 attackspam
unauthorized connection attempt
2020-01-28 16:45:15

Recently Reported IPs

18.139.70.14 18.191.82.184 14.139.58.154 107.174.124.34
20.24.17.172 192.177.93.39 49.241.46.89 103.89.89.236
212.192.219.156 185.43.16.171 13.235.5.144 5.53.124.147
37.35.42.249 187.50.165.110 66.7.220.3 107.172.247.251
198.199.101.62 63.141.246.123 46.101.77.234 20.214.152.203