Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.149.50.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58515
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;189.149.50.55.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 00:00:14 CST 2025
;; MSG SIZE  rcvd: 106
Host info
55.50.149.189.in-addr.arpa domain name pointer dsl-189-149-50-55-dyn.prod-infinitum.com.mx.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.50.149.189.in-addr.arpa	name = dsl-189-149-50-55-dyn.prod-infinitum.com.mx.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.63.217.54 attackbots
IP reached maximum auth failures
2020-07-31 02:42:32
151.236.92.4 attackbots
ICMP MH Probe, Scan /Distributed -
2020-07-31 02:52:00
119.40.37.126 attackspam
Jul 30 19:41:04 ns382633 sshd\[8092\]: Invalid user lixj from 119.40.37.126 port 30094
Jul 30 19:41:04 ns382633 sshd\[8092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.40.37.126
Jul 30 19:41:06 ns382633 sshd\[8092\]: Failed password for invalid user lixj from 119.40.37.126 port 30094 ssh2
Jul 30 19:55:04 ns382633 sshd\[10481\]: Invalid user opuser from 119.40.37.126 port 11537
Jul 30 19:55:04 ns382633 sshd\[10481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.40.37.126
2020-07-31 03:01:44
217.209.51.132 attackspam
Automatic report - Banned IP Access
2020-07-31 02:33:49
2001:e68:5057:6f48:12be:f5ff:fe2f:9580 attackspam
hacking into my e-mails
2020-07-31 03:02:17
182.253.117.99 attackspam
2020-07-29T10:22:23.324439hostname sshd[84665]: Failed password for invalid user pellegrini from 182.253.117.99 port 51138 ssh2
...
2020-07-31 02:27:34
209.97.138.179 attack
Jul 30 20:09:43 sip sshd[1135086]: Invalid user ladev from 209.97.138.179 port 48974
Jul 30 20:09:45 sip sshd[1135086]: Failed password for invalid user ladev from 209.97.138.179 port 48974 ssh2
Jul 30 20:13:58 sip sshd[1135131]: Invalid user rinko from 209.97.138.179 port 41742
...
2020-07-31 02:42:58
24.211.215.44 attack
B
2020-07-31 02:29:07
190.56.70.131 attackbots
Dovecot Invalid User Login Attempt.
2020-07-31 03:01:28
134.209.148.107 attackspam
Port Scan
...
2020-07-31 02:31:26
106.75.152.83 attackspambots
Jul 30 11:33:08 Host-KEWR-E sshd[22790]: Connection closed by 106.75.152.83 port 58128 [preauth]
...
2020-07-31 02:55:28
138.121.128.19 attackbots
Invalid user jira from 138.121.128.19 port 39228
2020-07-31 02:26:10
212.170.50.203 attack
Jul 30 17:47:02 django-0 sshd[15576]: Invalid user tssgw from 212.170.50.203
...
2020-07-31 02:39:03
151.236.95.8 attackbotsspam
ICMP MH Probe, Scan /Distributed -
2020-07-31 02:25:55
118.69.183.237 attackbots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-31 02:30:57

Recently Reported IPs

232.72.66.213 76.49.231.3 19.29.245.22 3.64.178.184
199.137.75.90 216.4.50.238 34.102.141.252 248.102.252.143
218.43.129.24 8.246.165.39 184.31.165.189 151.15.29.206
73.185.119.65 39.114.92.237 164.159.53.232 109.217.81.50
98.93.173.45 58.206.19.97 133.119.201.46 217.173.157.72