Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.230.249.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12728
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.230.249.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 18:53:25 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 50.249.230.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.249.230.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
115.206.61.239 attackbotsspam
SSH BruteForce Attack
2020-09-11 07:43:11
200.89.154.99 attackspambots
SSH Invalid Login
2020-09-11 07:29:17
222.175.223.74 attackbots
Failed password for invalid user ide from 222.175.223.74 port 33146 ssh2
2020-09-11 07:33:42
129.227.129.174 attack
Multiport scan : 7 ports scanned 84 102 1022 1302 1611 10331 18264
2020-09-11 07:45:20
167.71.187.10 attackspam
SSH Invalid Login
2020-09-11 07:44:48
213.194.99.250 attackspambots
Failed password for invalid user sysadm from 213.194.99.250 port 60308 ssh2
2020-09-11 07:34:13
111.71.36.30 attackbots
1599756914 - 09/10/2020 18:55:14 Host: 111.71.36.30/111.71.36.30 Port: 445 TCP Blocked
2020-09-11 07:58:14
80.135.26.81 attack
Firewall Dropped Connection
2020-09-11 07:49:31
201.240.28.169 attack
SMTP brute force
2020-09-11 07:27:26
121.181.222.12 attackbotsspam
Sep 10 18:55:46 andromeda sshd\[5746\]: Invalid user nagios from 121.181.222.12 port 58770
Sep 10 18:55:47 andromeda sshd\[5746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.181.222.12
Sep 10 18:55:48 andromeda sshd\[5746\]: Failed password for invalid user nagios from 121.181.222.12 port 58770 ssh2
2020-09-11 07:29:45
175.144.1.119 attack
Sep 10 18:55:21 db sshd[26655]: User root from 175.144.1.119 not allowed because none of user's groups are listed in AllowGroups
...
2020-09-11 07:51:59
167.99.137.75 attackbotsspam
Sep 10 22:35:31 vps8769 sshd[7674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.137.75
Sep 10 22:35:33 vps8769 sshd[7674]: Failed password for invalid user unithkd from 167.99.137.75 port 35392 ssh2
...
2020-09-11 07:51:00
82.117.239.183 attackspam
Automatic report - Banned IP Access
2020-09-11 07:55:59
95.85.9.94 attack
Automatic report - Banned IP Access
2020-09-11 07:54:29
118.69.13.37 attack
Port Scan detected!
...
2020-09-11 08:00:51

Recently Reported IPs

225.131.76.130 91.219.55.110 217.150.91.238 148.62.110.156
206.81.112.235 188.211.241.253 223.47.246.94 118.231.34.133
114.147.173.115 173.142.49.214 99.80.254.36 17.149.197.116
6.141.168.108 207.81.179.89 121.74.83.173 193.195.228.151
46.25.111.54 234.78.221.25 174.16.225.215 209.122.251.209