Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.50.94.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20500
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.50.94.68.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 13:56:10 CST 2022
;; MSG SIZE  rcvd: 104
Host info
68.94.50.13.in-addr.arpa domain name pointer ec2-13-50-94-68.eu-north-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.94.50.13.in-addr.arpa	name = ec2-13-50-94-68.eu-north-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.58.66.219 attackbots
1581742378 - 02/15/2020 05:52:58 Host: 103.58.66.219/103.58.66.219 Port: 445 TCP Blocked
2020-02-15 15:47:02
111.253.15.131 attack
unauthorized connection attempt
2020-02-15 15:55:42
93.157.204.156 attack
Feb 15 01:17:34 askasleikir sshd[129397]: Failed password for invalid user ts3server from 93.157.204.156 port 48242 ssh2
2020-02-15 16:34:34
111.252.73.149 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 16:03:07
218.92.0.179 attackbotsspam
Feb 15 09:24:30 h2177944 sshd\[593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.179  user=root
Feb 15 09:24:32 h2177944 sshd\[593\]: Failed password for root from 218.92.0.179 port 39506 ssh2
Feb 15 09:24:36 h2177944 sshd\[593\]: Failed password for root from 218.92.0.179 port 39506 ssh2
Feb 15 09:24:39 h2177944 sshd\[593\]: Failed password for root from 218.92.0.179 port 39506 ssh2
...
2020-02-15 16:25:55
177.40.67.31 attackspambots
Automatic report - Port Scan Attack
2020-02-15 15:49:47
170.244.253.159 attack
Portscan detected
2020-02-15 16:35:27
111.253.182.164 attack
unauthorized connection attempt
2020-02-15 15:51:57
111.252.43.53 attackspambots
unauthorized connection attempt
2020-02-15 16:20:17
188.19.124.120 attackbots
Telnet Server BruteForce Attack
2020-02-15 15:49:26
114.118.99.159 attack
15.02.2020 08:09:31 Connection to port 50172 blocked by firewall
2020-02-15 16:29:52
119.42.123.209 attack
1581742349 - 02/15/2020 05:52:29 Host: 119.42.123.209/119.42.123.209 Port: 445 TCP Blocked
2020-02-15 16:09:56
59.188.30.116 attack
$f2bV_matches
2020-02-15 16:28:08
200.236.125.49 attackbotsspam
Automatic report - Port Scan Attack
2020-02-15 15:53:32
104.244.76.56 attackspam
Automatic report - Banned IP Access
2020-02-15 16:37:00

Recently Reported IPs

243.220.8.53 58.187.223.192 194.21.154.176 23.144.208.91
20.118.99.220 202.5.32.192 202.228.33.239 218.2.0.180
118.207.48.52 233.158.54.12 240.91.32.190 253.212.89.20
241.84.253.162 44.204.18.212 228.7.232.190 55.60.16.16
77.32.213.94 80.91.35.63 210.191.84.47 137.200.51.40