Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 19.114.150.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19779
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;19.114.150.49.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 20:26:17 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 49.150.114.19.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.150.114.19.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
212.129.52.3 attack
ssh failed login
2019-08-30 11:28:32
51.254.205.6 attackspam
Invalid user uftp from 51.254.205.6 port 34296
2019-08-30 11:30:04
189.33.225.27 attackbots
2019-08-29T21:28:48.320091abusebot-8.cloudsearch.cf sshd\[15185\]: Invalid user user01 from 189.33.225.27 port 35201
2019-08-30 11:22:05
4.16.43.2 attackbots
Invalid user bs from 4.16.43.2 port 60358
2019-08-30 11:09:31
122.228.19.79 attackspam
Aug 29 20:49:27 mail postfix/postscreen[98253]: PREGREET 22 after 0.22 from [122.228.19.79]:13446: EHLO [122.228.19.79]

...
2019-08-30 11:47:23
159.89.225.82 attackspambots
Invalid user deploy from 159.89.225.82 port 54178
2019-08-30 11:03:11
106.38.120.189 attack
RDP Scan
2019-08-30 11:33:33
116.140.162.82 attackbots
Unauthorised access (Aug 29) SRC=116.140.162.82 LEN=40 TTL=49 ID=18933 TCP DPT=8080 WINDOW=27198 SYN 
Unauthorised access (Aug 29) SRC=116.140.162.82 LEN=40 TTL=49 ID=29457 TCP DPT=8080 WINDOW=3451 SYN
2019-08-30 11:43:24
111.231.82.143 attackspam
$f2bV_matches_ltvn
2019-08-30 11:45:04
103.218.241.91 attackspambots
Invalid user apagar from 103.218.241.91 port 54008
2019-08-30 11:35:36
69.158.249.44 attackbotsspam
port scan and connect, tcp 22 (ssh)
2019-08-30 11:31:58
83.37.58.39 attack
Aug 30 03:23:44 MK-Soft-VM7 sshd\[30876\]: Invalid user anurag from 83.37.58.39 port 54614
Aug 30 03:23:44 MK-Soft-VM7 sshd\[30876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.37.58.39
Aug 30 03:23:46 MK-Soft-VM7 sshd\[30876\]: Failed password for invalid user anurag from 83.37.58.39 port 54614 ssh2
...
2019-08-30 11:34:00
223.197.250.72 attackbotsspam
Aug 30 02:33:38 meumeu sshd[5414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.250.72 
Aug 30 02:33:40 meumeu sshd[5414]: Failed password for invalid user kong from 223.197.250.72 port 51200 ssh2
Aug 30 02:42:02 meumeu sshd[6579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.250.72 
...
2019-08-30 11:21:04
159.65.54.221 attackbotsspam
Aug 30 12:53:35 [hidden] sshd[27508]: refused connect from 159.65.54.221 (159.65.54.221)
Aug 30 13:02:20 [hidden] sshd[27748]: refused connect from 159.65.54.221 (159.65.54.221)
Aug 30 13:10:34 [hidden] sshd[28083]: refused connect from 159.65.54.221 (159.65.54.221)
2019-08-30 11:25:24
209.17.96.106 attackspam
port scan and connect, tcp 2121 (ccproxy-ftp)
2019-08-30 11:41:27

Recently Reported IPs

72.236.30.88 25.141.70.134 58.30.194.124 98.61.188.58
115.53.208.186 84.170.90.183 192.176.177.63 41.44.207.55
141.254.188.129 121.160.254.229 149.153.34.75 31.110.19.223
187.45.229.157 171.37.230.197 148.149.185.151 186.96.37.52
31.187.206.54 126.5.193.16 167.219.119.209 136.122.46.157