Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.28.50.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40791
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.28.50.68.			IN	A

;; AUTHORITY SECTION:
.			238	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 04:36:03 CST 2022
;; MSG SIZE  rcvd: 105
Host info
68.50.28.149.in-addr.arpa domain name pointer mjs.myjobspace.co.nz.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.50.28.149.in-addr.arpa	name = mjs.myjobspace.co.nz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
128.199.199.113 attack
Invalid user felix from 128.199.199.113 port 53176
2019-08-26 08:17:16
157.230.2.208 attackspambots
Aug 25 19:48:19 TORMINT sshd\[26325\]: Invalid user silvia from 157.230.2.208
Aug 25 19:48:19 TORMINT sshd\[26325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.2.208
Aug 25 19:48:22 TORMINT sshd\[26325\]: Failed password for invalid user silvia from 157.230.2.208 port 39372 ssh2
...
2019-08-26 08:10:40
104.40.4.51 attackbotsspam
Automatic report - Banned IP Access
2019-08-26 07:53:41
73.97.215.254 attackspam
Aug 25 08:38:37 php2 sshd\[30061\]: Invalid user sr from 73.97.215.254
Aug 25 08:38:37 php2 sshd\[30061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-97-215-254.hsd1.wa.comcast.net
Aug 25 08:38:38 php2 sshd\[30061\]: Failed password for invalid user sr from 73.97.215.254 port 60292 ssh2
Aug 25 08:45:43 php2 sshd\[30868\]: Invalid user wp from 73.97.215.254
Aug 25 08:45:43 php2 sshd\[30868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-97-215-254.hsd1.wa.comcast.net
2019-08-26 08:09:57
150.161.50.109 attackbotsspam
Aug 26 01:57:36 MK-Soft-Root1 sshd\[15105\]: Invalid user radius from 150.161.50.109 port 56788
Aug 26 01:57:36 MK-Soft-Root1 sshd\[15105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.161.50.109
Aug 26 01:57:38 MK-Soft-Root1 sshd\[15105\]: Failed password for invalid user radius from 150.161.50.109 port 56788 ssh2
...
2019-08-26 07:58:51
145.239.10.217 attack
Aug 25 14:05:09 hiderm sshd\[5195\]: Invalid user toor from 145.239.10.217
Aug 25 14:05:09 hiderm sshd\[5195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3088253.ip-145-239-10.eu
Aug 25 14:05:11 hiderm sshd\[5195\]: Failed password for invalid user toor from 145.239.10.217 port 35802 ssh2
Aug 25 14:09:12 hiderm sshd\[5648\]: Invalid user digital from 145.239.10.217
Aug 25 14:09:12 hiderm sshd\[5648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3088253.ip-145-239-10.eu
2019-08-26 08:11:52
116.196.83.174 attackspambots
Aug 25 23:52:08 vps691689 sshd[17866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.83.174
Aug 25 23:52:10 vps691689 sshd[17866]: Failed password for invalid user gt from 116.196.83.174 port 50866 ssh2
...
2019-08-26 07:43:25
84.242.96.142 attackspambots
2019-08-26T01:01:46.377995centos sshd\[14566\]: Invalid user hi from 84.242.96.142 port 43868
2019-08-26T01:01:46.384460centos sshd\[14566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static-84-242-96-142.net.upcbroadband.cz
2019-08-26T01:01:48.554201centos sshd\[14566\]: Failed password for invalid user hi from 84.242.96.142 port 43868 ssh2
2019-08-26 07:55:44
186.207.128.104 attackspambots
Aug 25 10:41:33 kapalua sshd\[2677\]: Invalid user scanner from 186.207.128.104
Aug 25 10:41:33 kapalua sshd\[2677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.207.128.104
Aug 25 10:41:35 kapalua sshd\[2677\]: Failed password for invalid user scanner from 186.207.128.104 port 31881 ssh2
Aug 25 10:47:08 kapalua sshd\[3185\]: Invalid user priv from 186.207.128.104
Aug 25 10:47:08 kapalua sshd\[3185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.207.128.104
2019-08-26 07:52:36
74.208.235.29 attackspam
2019-08-25T23:56:08.994755abusebot.cloudsearch.cf sshd\[26572\]: Invalid user asterisk from 74.208.235.29 port 49914
2019-08-26 08:14:35
112.45.114.76 attackbots
SPAM Delivery Attempt
2019-08-26 08:11:00
177.68.142.3 attackspambots
SSHAttack
2019-08-26 08:18:21
52.80.52.242 attack
Aug 25 12:08:35 lcdev sshd\[5777\]: Invalid user cali from 52.80.52.242
Aug 25 12:08:35 lcdev sshd\[5777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-52-80-52-242.cn-north-1.compute.amazonaws.com.cn
Aug 25 12:08:37 lcdev sshd\[5777\]: Failed password for invalid user cali from 52.80.52.242 port 34998 ssh2
Aug 25 12:13:16 lcdev sshd\[6321\]: Invalid user testuser from 52.80.52.242
Aug 25 12:13:16 lcdev sshd\[6321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-52-80-52-242.cn-north-1.compute.amazonaws.com.cn
2019-08-26 08:02:50
139.199.192.159 attack
Aug 25 21:45:41 MK-Soft-Root1 sshd\[9367\]: Invalid user jojo from 139.199.192.159 port 60568
Aug 25 21:45:41 MK-Soft-Root1 sshd\[9367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.192.159
Aug 25 21:45:44 MK-Soft-Root1 sshd\[9367\]: Failed password for invalid user jojo from 139.199.192.159 port 60568 ssh2
...
2019-08-26 08:13:49
35.226.7.227 attack
Port Scan: TCP/1111
2019-08-26 08:07:49

Recently Reported IPs

149.28.51.200 149.28.57.147 149.28.58.245 149.28.57.78
149.28.56.149 149.28.61.69 149.28.53.169 149.28.63.63
149.28.71.171 149.28.74.226 149.28.75.116 149.28.72.20
149.28.79.103 149.28.84.86 149.28.86.178 242.109.163.189
149.28.91.210 149.28.92.148 149.28.87.71 149.56.20.213