Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.50.220.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28675
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.50.220.194.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 03:35:47 CST 2025
;; MSG SIZE  rcvd: 107
Host info
194.220.50.149.in-addr.arpa domain name pointer unn-149-50-220-194.datapacket.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
194.220.50.149.in-addr.arpa	name = unn-149-50-220-194.datapacket.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
158.69.0.3 attackbots
Aug 23 08:19:34 host sshd\[42007\]: Invalid user deploy from 158.69.0.3 port 57560
Aug 23 08:19:35 host sshd\[42007\]: Failed password for invalid user deploy from 158.69.0.3 port 57560 ssh2
...
2019-08-23 15:51:15
185.244.25.111 attackbots
Invalid user admin from 185.244.25.111 port 39520
2019-08-23 16:26:27
54.154.167.0 attackspambots
Invalid user kd from 54.154.167.0 port 50143
2019-08-23 16:46:44
168.126.85.225 attackspambots
Aug 23 09:35:17 mail sshd\[22544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.126.85.225
Aug 23 09:35:19 mail sshd\[22544\]: Failed password for invalid user henry from 168.126.85.225 port 40282 ssh2
Aug 23 09:40:08 mail sshd\[23694\]: Invalid user ali from 168.126.85.225 port 56298
Aug 23 09:40:08 mail sshd\[23694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.126.85.225
Aug 23 09:40:10 mail sshd\[23694\]: Failed password for invalid user ali from 168.126.85.225 port 56298 ssh2
2019-08-23 15:49:43
37.187.46.74 attackspambots
Aug 23 03:08:03 ny01 sshd[5237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.46.74
Aug 23 03:08:06 ny01 sshd[5237]: Failed password for invalid user share from 37.187.46.74 port 47806 ssh2
Aug 23 03:14:35 ny01 sshd[5820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.46.74
2019-08-23 16:52:14
109.19.16.40 attackbotsspam
Aug 23 07:45:54 XXX sshd[19062]: Invalid user ofsaa from 109.19.16.40 port 49424
2019-08-23 16:41:23
138.122.202.217 attackbotsspam
Invalid user april from 138.122.202.217 port 42512
2019-08-23 15:54:32
106.12.89.190 attackspam
Aug 23 14:17:03 lcl-usvr-02 sshd[8696]: Invalid user robin from 106.12.89.190 port 36438
Aug 23 14:17:03 lcl-usvr-02 sshd[8696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.190
Aug 23 14:17:03 lcl-usvr-02 sshd[8696]: Invalid user robin from 106.12.89.190 port 36438
Aug 23 14:17:05 lcl-usvr-02 sshd[8696]: Failed password for invalid user robin from 106.12.89.190 port 36438 ssh2
Aug 23 14:22:20 lcl-usvr-02 sshd[9974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.190  user=root
Aug 23 14:22:22 lcl-usvr-02 sshd[9974]: Failed password for root from 106.12.89.190 port 52274 ssh2
...
2019-08-23 16:03:34
162.248.54.39 attack
Aug 22 22:11:58 web9 sshd\[20359\]: Invalid user ic1 from 162.248.54.39
Aug 22 22:11:58 web9 sshd\[20359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.248.54.39
Aug 22 22:12:00 web9 sshd\[20359\]: Failed password for invalid user ic1 from 162.248.54.39 port 36486 ssh2
Aug 22 22:16:16 web9 sshd\[21195\]: Invalid user visuelconcept from 162.248.54.39
Aug 22 22:16:16 web9 sshd\[21195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.248.54.39
2019-08-23 16:28:24
111.19.163.174 attack
Invalid user qomo from 111.19.163.174 port 57646
2019-08-23 16:00:51
106.118.30.11 attackspam
Invalid user admin from 106.118.30.11 port 45304
2019-08-23 16:02:26
103.45.149.216 attack
Aug 23 07:35:54 MK-Soft-VM7 sshd\[29656\]: Invalid user harrison from 103.45.149.216 port 34648
Aug 23 07:35:54 MK-Soft-VM7 sshd\[29656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.149.216
Aug 23 07:35:55 MK-Soft-VM7 sshd\[29656\]: Failed password for invalid user harrison from 103.45.149.216 port 34648 ssh2
...
2019-08-23 16:05:26
51.75.30.238 attackspam
Invalid user bbrazunas from 51.75.30.238 port 49508
2019-08-23 16:49:31
134.209.70.255 attackspam
Invalid user user1 from 134.209.70.255 port 42210
2019-08-23 16:36:27
23.129.64.100 attackbots
Invalid user james from 23.129.64.100 port 41491
2019-08-23 16:18:45

Recently Reported IPs

134.76.114.113 172.179.18.92 31.181.133.76 88.71.92.125
221.203.186.94 226.189.224.39 86.152.47.43 244.172.59.147
160.161.244.201 213.176.12.70 178.228.100.89 13.193.226.51
136.154.184.255 182.115.69.14 247.179.10.205 217.5.28.228
76.237.180.62 247.58.137.123 189.220.179.204 38.153.83.105