Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sakon Nakhon

Region: Sakon Nakhon

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.49.85.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25608
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.49.85.140.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030601 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 07 12:50:52 CST 2025
;; MSG SIZE  rcvd: 105
Host info
140.85.49.49.in-addr.arpa domain name pointer mx-ll-49.49.85-140.dynamic.3bb.co.th.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.85.49.49.in-addr.arpa	name = mx-ll-49.49.85-140.dynamic.3bb.co.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.58.57.134 normal
Whether activated or not
2019-11-20 09:41:16
184.154.189.94 attackbotsspam
993/tcp 2222/tcp 26/tcp...
[2019-10-02/11-19]7pkt,7pt.(tcp)
2019-11-20 08:48:27
182.184.61.5 attackspam
Automatic report - Port Scan Attack
2019-11-20 09:07:49
142.93.187.70 attackspam
Security scanner
2019-11-20 08:51:17
162.62.19.137 attack
620/tcp 44443/tcp 548/tcp...
[2019-09-26/11-19]8pkt,7pt.(tcp),1pt.(udp)
2019-11-20 08:44:45
185.153.199.7 attackspam
11/20/2019-01:37:51.823043 185.153.199.7 Protocol: 6 ET SCAN MS Terminal Server Traffic on Non-standard Port
2019-11-20 08:39:21
5.189.188.207 attackbotsspam
WEB Masscan Scanner Activity
2019-11-20 08:57:20
178.238.227.208 attack
WEB Masscan Scanner Activity
2019-11-20 08:49:19
46.101.167.221 attack
WEB Masscan Scanner Activity
2019-11-20 08:56:04
159.65.188.111 attack
WEB Masscan Scanner Activity
2019-11-20 08:50:07
49.88.112.67 attack
Nov 20 01:54:34 v22018053744266470 sshd[32438]: Failed password for root from 49.88.112.67 port 30833 ssh2
Nov 20 01:56:22 v22018053744266470 sshd[32553]: Failed password for root from 49.88.112.67 port 37970 ssh2
...
2019-11-20 09:01:04
46.101.73.64 attackbots
Nov 20 06:51:37 pkdns2 sshd\[1085\]: Invalid user saturn from 46.101.73.64Nov 20 06:51:39 pkdns2 sshd\[1085\]: Failed password for invalid user saturn from 46.101.73.64 port 45968 ssh2Nov 20 06:54:42 pkdns2 sshd\[1197\]: Invalid user vi from 46.101.73.64Nov 20 06:54:44 pkdns2 sshd\[1197\]: Failed password for invalid user vi from 46.101.73.64 port 53618 ssh2Nov 20 06:57:51 pkdns2 sshd\[1342\]: Invalid user haugom from 46.101.73.64Nov 20 06:57:53 pkdns2 sshd\[1342\]: Failed password for invalid user haugom from 46.101.73.64 port 33040 ssh2
...
2019-11-20 13:01:09
5.189.132.31 attackspam
WEB Masscan Scanner Activity
2019-11-20 09:02:05
89.122.138.47 attackbotsspam
Automatic report - Port Scan Attack
2019-11-20 08:39:45
51.38.57.199 attack
Brute force attack stopped by firewall
2019-11-20 08:55:40

Recently Reported IPs

185.162.77.217 143.150.80.64 97.221.35.122 93.176.126.146
226.138.67.185 202.192.126.248 108.171.24.109 201.91.9.156
53.33.149.0 252.191.201.62 85.63.178.33 94.231.224.199
231.77.188.103 215.111.232.6 157.184.191.110 29.22.97.167
187.101.142.201 120.73.172.241 231.17.95.109 235.151.51.153