Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.122.63.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42356
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.122.63.50.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 03:39:11 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 50.63.122.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.63.122.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
123.206.118.47 attackspambots
Mar  3 06:45:22 raspberrypi sshd\[15460\]: Invalid user overwatch from 123.206.118.47Mar  3 06:45:23 raspberrypi sshd\[15460\]: Failed password for invalid user overwatch from 123.206.118.47 port 59630 ssh2Mar 10 09:17:00 raspberrypi sshd\[1099\]: Invalid user eisp from 123.206.118.47
...
2020-03-11 01:55:32
64.227.17.124 attack
WordPress login attack
2020-03-11 02:10:48
193.31.117.22 attack
SpamScore above: 10.0
2020-03-11 01:35:26
42.236.91.186 attackbots
Portscan or hack attempt detected by psad/fwsnort
2020-03-11 01:30:05
89.248.168.202 attackbots
03/10/2020-13:09:10.968088 89.248.168.202 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-11 01:41:47
189.210.112.221 attack
Automatic report - Port Scan Attack
2020-03-11 02:01:01
36.89.75.253 attackbotsspam
Unauthorized connection attempt from IP address 36.89.75.253 on Port 445(SMB)
2020-03-11 01:47:04
159.192.143.129 attack
" "
2020-03-11 01:25:27
178.214.233.143 attack
Unauthorized connection attempt from IP address 178.214.233.143 on Port 445(SMB)
2020-03-11 01:52:51
194.219.37.89 attack
DATE:2020-03-10 10:17:33, IP:194.219.37.89, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2020-03-11 01:30:42
171.231.204.77 attack
Automatic report - Port Scan Attack
2020-03-11 02:06:19
103.216.135.138 attack
1583831834 - 03/10/2020 16:17:14 Host: 103.216.135.138/103.216.135.138 Port: 8080 TCP Blocked
...
2020-03-11 01:42:16
84.17.49.238 attack
Monday, March 09, 2020 4:20 AM Sent from (ip address): 84.17.49.238 (unn-84-17-49-238.cdn77.com) From: Aaron Coarl  241Club form spam
2020-03-11 01:33:46
125.27.179.174 attack
(sshd) Failed SSH login from 125.27.179.174 (TH/Thailand/node-zhq.pool-125-27.dynamic.totinternet.net): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Mar 10 05:17:34 host sshd[99090]: Did not receive identification string from 125.27.179.174 port 56537
2020-03-11 01:28:18
62.215.77.53 attackspam
port scan and connect, tcp 23 (telnet)
2020-03-11 01:49:46

Recently Reported IPs

181.134.83.92 101.106.182.200 116.229.30.250 101.174.140.197
253.196.83.200 214.204.134.215 240.5.187.200 54.57.102.181
252.99.47.231 64.85.84.219 134.250.254.121 131.243.114.114
72.227.213.122 44.143.199.241 234.199.112.101 226.181.146.254
92.236.79.226 250.16.77.218 232.26.227.219 220.89.47.90