Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
49.49.50.195 attack
Port Scan
...
2020-07-21 14:29:18
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.49.50.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27652
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.49.50.199.			IN	A

;; AUTHORITY SECTION:
.			252	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 17:46:44 CST 2022
;; MSG SIZE  rcvd: 105
Host info
199.50.49.49.in-addr.arpa domain name pointer mx-ll-49.49.50-199.dynamic.3bb.in.th.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
199.50.49.49.in-addr.arpa	name = mx-ll-49.49.50-199.dynamic.3bb.in.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.30.218 attackbots
Jun  2 02:30:18 web9 sshd\[25830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.218  user=root
Jun  2 02:30:20 web9 sshd\[25830\]: Failed password for root from 222.186.30.218 port 26333 ssh2
Jun  2 02:30:30 web9 sshd\[25844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.218  user=root
Jun  2 02:30:31 web9 sshd\[25844\]: Failed password for root from 222.186.30.218 port 50524 ssh2
Jun  2 02:30:37 web9 sshd\[25859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.218  user=root
2020-06-02 20:32:40
165.22.48.65 attackspam
Attempted connection to port 27017.
2020-06-02 20:04:02
51.83.216.216 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-06-02 20:11:06
5.77.253.14 attack
Attempted connection to port 445.
2020-06-02 19:51:38
43.245.185.66 attackbots
Jun  2 14:01:29 * sshd[5371]: Failed password for root from 43.245.185.66 port 40172 ssh2
2020-06-02 20:18:46
139.59.75.162 attack
Automatic report - XMLRPC Attack
2020-06-02 20:16:07
218.250.21.203 attackspam
Jun  2 14:08:49 fhem-rasp sshd[8166]: Failed password for root from 218.250.21.203 port 48930 ssh2
Jun  2 14:08:52 fhem-rasp sshd[8166]: Connection closed by authenticating user root 218.250.21.203 port 48930 [preauth]
...
2020-06-02 20:25:11
180.250.69.213 attackbots
Jun  2 06:30:46 marvibiene sshd[14197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.69.213  user=root
Jun  2 06:30:48 marvibiene sshd[14197]: Failed password for root from 180.250.69.213 port 35996 ssh2
Jun  2 06:35:51 marvibiene sshd[14273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.69.213  user=root
Jun  2 06:35:54 marvibiene sshd[14273]: Failed password for root from 180.250.69.213 port 49346 ssh2
...
2020-06-02 19:57:28
212.109.29.24 attack
Unauthorized connection attempt from IP address 212.109.29.24 on Port 445(SMB)
2020-06-02 19:49:33
122.210.222.156 attackspam
Attempted connection to port 5555.
2020-06-02 20:06:33
148.251.92.39 attackspam
20 attempts against mh-misbehave-ban on pole
2020-06-02 20:28:10
159.192.220.88 attack
Unauthorized connection attempt from IP address 159.192.220.88 on Port 445(SMB)
2020-06-02 19:57:50
185.45.165.100 attackbotsspam
Jun  2 14:08:47 fhem-rasp sshd[8172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.45.165.100  user=pi
Jun  2 14:08:49 fhem-rasp sshd[8172]: Failed password for invalid user pi from 185.45.165.100 port 49754 ssh2
...
2020-06-02 20:27:40
106.13.198.131 attack
2020-06-02T15:10:41.031080mail.standpoint.com.ua sshd[26209]: Failed password for root from 106.13.198.131 port 45894 ssh2
2020-06-02T15:12:07.222649mail.standpoint.com.ua sshd[26426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.198.131  user=root
2020-06-02T15:12:09.200487mail.standpoint.com.ua sshd[26426]: Failed password for root from 106.13.198.131 port 35314 ssh2
2020-06-02T15:13:39.400395mail.standpoint.com.ua sshd[26653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.198.131  user=root
2020-06-02T15:13:41.675451mail.standpoint.com.ua sshd[26653]: Failed password for root from 106.13.198.131 port 52966 ssh2
...
2020-06-02 20:22:27
45.118.148.242 attackspam
Attempted connection to port 22.
2020-06-02 19:54:03

Recently Reported IPs

49.49.28.224 49.49.4.128 49.49.34.190 49.49.76.166
49.49.90.117 49.50.229.38 49.64.175.187 49.64.176.204
49.64.225.152 49.65.117.201 49.64.167.52 49.68.121.3
49.67.3.7 49.64.24.87 49.66.80.103 49.65.112.225
49.66.33.176 49.68.153.87 49.68.171.30 49.68.169.172