Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Wilberforce

Region: Ohio

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.50.6.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61798
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;144.50.6.11.			IN	A

;; AUTHORITY SECTION:
.			472	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020601 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:46:14 CST 2020
;; MSG SIZE  rcvd: 115
Host info
Host 11.6.50.144.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.6.50.144.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
170.210.203.215 attackbots
Invalid user wnd from 170.210.203.215 port 44838
2020-05-23 12:13:37
185.153.197.103 attackspam
firewall-block, port(s): 3390/tcp
2020-05-23 12:08:34
178.33.12.237 attackspam
Invalid user zko from 178.33.12.237 port 52831
2020-05-23 12:11:11
120.131.13.186 attack
Invalid user qxp from 120.131.13.186 port 15508
2020-05-23 12:19:46
217.54.187.42 attack
Invalid user service from 217.54.187.42 port 55445
2020-05-23 12:38:22
222.186.173.215 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
Failed password for root from 222.186.173.215 port 5406 ssh2
Failed password for root from 222.186.173.215 port 5406 ssh2
Failed password for root from 222.186.173.215 port 5406 ssh2
Failed password for root from 222.186.173.215 port 5406 ssh2
2020-05-23 12:35:45
193.70.42.33 attackspambots
Invalid user jcr from 193.70.42.33 port 46004
2020-05-23 12:07:08
201.55.199.143 attackbotsspam
Invalid user cva from 201.55.199.143 port 60010
2020-05-23 12:41:18
213.141.131.22 attackbots
Invalid user rlp from 213.141.131.22 port 44998
2020-05-23 12:03:26
106.12.137.46 attackbots
Invalid user iww from 106.12.137.46 port 47568
2020-05-23 12:24:41
40.113.153.70 attack
Invalid user zex from 40.113.153.70 port 54966
2020-05-23 12:32:29
156.217.70.58 attack
Invalid user service from 156.217.70.58 port 60315
2020-05-23 12:14:46
176.31.255.223 attack
May 23 01:00:35 firewall sshd[27853]: Invalid user snp from 176.31.255.223
May 23 01:00:37 firewall sshd[27853]: Failed password for invalid user snp from 176.31.255.223 port 54380 ssh2
May 23 01:03:42 firewall sshd[27958]: Invalid user dji from 176.31.255.223
...
2020-05-23 12:12:04
1.2.157.128 attackspam
Invalid user service from 1.2.157.128 port 1260
2020-05-23 12:35:07
222.85.230.155 attackspambots
Invalid user hackingtools from 222.85.230.155 port 6918
2020-05-23 12:36:34

Recently Reported IPs

114.43.182.136 152.32.96.199 60.246.3.71 84.203.181.64
186.78.231.159 187.227.83.172 65.144.125.113 52.80.42.177
152.32.96.230 125.64.123.39 85.199.81.51 108.205.128.212
223.99.211.149 14.161.43.107 56.3.107.60 90.178.192.169
177.203.49.27 65.15.189.71 138.0.91.236 1.80.164.23