Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hattula

Region: Kanta-Hame

Country: Finland

Internet Service Provider: DNA

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 188.67.50.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52740
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;188.67.50.114.			IN	A

;; AUTHORITY SECTION:
.			519	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020080301 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Aug 04 08:58:27 CST 2020
;; MSG SIZE  rcvd: 117
Host info
114.50.67.188.in-addr.arpa domain name pointer 188-67-50-114.bb.dnainternet.fi.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
114.50.67.188.in-addr.arpa	name = 188-67-50-114.bb.dnainternet.fi.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.225.35.56 attack
Jan 13 15:04:39 MK-Soft-Root1 sshd[5844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.225.35.56 
Jan 13 15:04:40 MK-Soft-Root1 sshd[5844]: Failed password for invalid user kiran from 94.225.35.56 port 50968 ssh2
...
2020-01-14 04:54:37
112.197.223.190 attack
Honeypot attack, port: 5555, PTR: PTR record not found
2020-01-14 05:20:57
213.142.203.146 attackbots
Unauthorized connection attempt from IP address 213.142.203.146 on Port 445(SMB)
2020-01-14 05:19:12
125.162.240.149 attackspambots
Honeypot attack, port: 445, PTR: 149.subnet125-162-240.speedy.telkom.net.id.
2020-01-14 04:51:46
192.144.132.172 attackbots
Unauthorized connection attempt detected from IP address 192.144.132.172 to port 2220 [J]
2020-01-14 05:22:41
71.240.165.92 attackbotsspam
Honeypot attack, port: 445, PTR: static-71-240-165-92.dllstx.fios.frontiernet.net.
2020-01-14 05:18:12
79.2.58.112 attack
ssh failed login
2020-01-14 04:57:54
189.3.194.212 attackspam
Unauthorized connection attempt from IP address 189.3.194.212 on Port 445(SMB)
2020-01-14 05:10:19
94.230.208.148 attackbotsspam
Unauthorized access detected from banned ip
2020-01-14 04:49:31
172.104.242.173 attack
Unauthorized connection attempt detected from IP address 172.104.242.173 to port 135 [J]
2020-01-14 04:54:11
92.124.144.172 attack
Unauthorized connection attempt from IP address 92.124.144.172 on Port 445(SMB)
2020-01-14 05:14:31
185.175.93.104 attack
ET DROP Dshield Block Listed Source group 1 - port: 3373 proto: TCP cat: Misc Attack
2020-01-14 05:19:26
46.201.229.122 attackspambots
Honeypot attack, port: 445, PTR: 122-229-201-46.pool.ukrtel.net.
2020-01-14 05:02:27
117.2.208.232 attackspam
Honeypot attack, port: 445, PTR: localhost.
2020-01-14 05:14:06
27.147.177.48 attack
ssh bruteforce or scan
...
2020-01-14 05:18:39

Recently Reported IPs

144.24.132.124 62.155.9.156 138.219.29.255 202.35.253.210
111.32.188.253 85.63.169.32 220.84.252.68 202.73.34.69
196.120.125.115 105.185.50.34 13.14.94.248 112.0.234.191
93.224.106.248 202.123.85.206 216.96.86.80 194.165.122.191
201.165.165.147 74.82.131.13 93.55.170.111 122.150.66.155