Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.9.50.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4319
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;148.9.50.71.			IN	A

;; AUTHORITY SECTION:
.			276	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103101 1800 900 604800 86400

;; Query time: 101 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 01 02:30:24 CST 2019
;; MSG SIZE  rcvd: 115
Host info
Host 71.50.9.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 71.50.9.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.128.6.194 attackbots
$f2bV_matches
2020-07-26 18:49:03
54.38.65.215 attack
Invalid user portal from 54.38.65.215 port 53857
2020-07-26 18:52:15
138.68.99.46 attackbotsspam
Invalid user deploy from 138.68.99.46 port 57990
2020-07-26 18:28:23
129.204.238.250 attackbots
Invalid user rolando from 129.204.238.250 port 49784
2020-07-26 18:33:09
54.39.145.123 attack
Multiple SSH authentication failures from 54.39.145.123
2020-07-26 18:39:01
103.242.56.182 attackbotsspam
Invalid user mohammad from 103.242.56.182 port 33427
2020-07-26 18:25:05
201.194.204.155 attack
Telnet Server BruteForce Attack
2020-07-26 18:22:42
165.227.182.136 attackbotsspam
Invalid user mzy from 165.227.182.136 port 41670
2020-07-26 18:40:07
41.65.252.105 attackbotsspam
Automatic report - Port Scan Attack
2020-07-26 18:32:32
195.68.98.200 attack
Jul 26 07:45:47 OPSO sshd\[7233\]: Invalid user yos from 195.68.98.200 port 44656
Jul 26 07:45:47 OPSO sshd\[7233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.68.98.200
Jul 26 07:45:49 OPSO sshd\[7233\]: Failed password for invalid user yos from 195.68.98.200 port 44656 ssh2
Jul 26 07:50:00 OPSO sshd\[7576\]: Invalid user mca from 195.68.98.200 port 55286
Jul 26 07:50:00 OPSO sshd\[7576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.68.98.200
2020-07-26 18:16:30
111.229.121.142 attack
Invalid user lili from 111.229.121.142 port 40582
2020-07-26 18:48:36
202.186.93.169 attackspam
firewall-block, port(s): 445/tcp
2020-07-26 18:31:47
180.7.21.210 attackspambots
Jul 26 05:50:15 sip sshd[1081673]: Invalid user gama from 180.7.21.210 port 62159
Jul 26 05:50:17 sip sshd[1081673]: Failed password for invalid user gama from 180.7.21.210 port 62159 ssh2
Jul 26 05:52:00 sip sshd[1081682]: Invalid user qp from 180.7.21.210 port 60574
...
2020-07-26 18:49:30
99.185.76.161 attackbots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-26 18:55:16
42.112.205.26 attackbots
Automatic report - Port Scan Attack
2020-07-26 18:25:24

Recently Reported IPs

45.53.223.40 68.126.0.164 222.94.6.50 55.66.209.213
4.12.141.107 193.5.242.153 201.176.27.224 215.38.15.116
184.45.156.140 143.193.155.235 214.235.44.44 204.195.100.200
63.80.184.88 163.104.166.62 59.80.255.20 54.104.96.195
189.227.59.35 210.119.175.171 226.51.62.191 17.218.248.13