Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Dominican Republic

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.80.202.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17862
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;190.80.202.50.			IN	A

;; AUTHORITY SECTION:
.			96	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062800 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 29 01:03:24 CST 2022
;; MSG SIZE  rcvd: 106
Host info
50.202.80.190.in-addr.arpa domain name pointer 50.202.80.190.m.sta.codetel.net.do.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.202.80.190.in-addr.arpa	name = 50.202.80.190.m.sta.codetel.net.do.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
54.37.238.33 attackbots
Unauthorized access detected from banned ip
2019-11-30 22:11:10
101.51.126.71 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-11-30 22:03:25
104.223.225.95 attackbotsspam
Canada Goose Counterfeit Spam

Received: from sxw.dadimy.cn (104.223.225.95)
Date: Thu, 28 Nov 2019 20:50:59 +0100
Return-Path: bounce-4_____8@dadimy.cn
From: Canada Goose 
Reply-to: Canada Goose 
Subject: Black Friday Best Deals: Winter Coats 70% OFF Ends Soon!
Message-ID: <1_____c@localhost>

RetailMeNot
2019 Black Friday Sale is Open Now!
Canada Goose
Canada Goose
Canada Goose Black Friday Sale Up To 70% OFF & Worldwide Free Shipping!
Expires Soon!
Get Deal
See More Deals
facebooktwitterg+ pinterest
If you do not wish to receive any further communications of this type, unsubscribe.
Get the latest on savings, finance, couponing... Goose Outlet Store
Some of these deals feature products with limited quantities. Prices and quantities may be subject to change by retailers at their discretion.
Copyright 2019 RetailMeNot, Inc., 301 Congress Avenue Suite 700, Austin, TX, 78701 USA
2019-11-30 22:24:14
179.33.137.117 attackbots
(sshd) Failed SSH login from 179.33.137.117 (CO/Colombia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Nov 30 15:23:21 s1 sshd[22631]: Invalid user admin from 179.33.137.117 port 59084
Nov 30 15:23:23 s1 sshd[22631]: Failed password for invalid user admin from 179.33.137.117 port 59084 ssh2
Nov 30 15:43:51 s1 sshd[23166]: Invalid user test from 179.33.137.117 port 51680
Nov 30 15:43:53 s1 sshd[23166]: Failed password for invalid user test from 179.33.137.117 port 51680 ssh2
Nov 30 15:48:02 s1 sshd[23279]: Invalid user a4 from 179.33.137.117 port 58838
2019-11-30 22:32:24
181.65.164.179 attackspambots
Invalid user elisangela from 181.65.164.179 port 54910
2019-11-30 22:06:11
154.8.209.64 attackspambots
Invalid user ra from 154.8.209.64 port 59500
2019-11-30 22:08:18
184.105.139.67 attackbotsspam
GPL SNMP public access udp - port: 161 proto: UDP cat: Attempted Information Leak
2019-11-30 22:15:43
106.51.2.108 attackbotsspam
SSH invalid-user multiple login try
2019-11-30 22:37:47
220.191.160.42 attack
Automatic report - Banned IP Access
2019-11-30 22:07:50
1.34.177.249 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-11-30 22:06:31
94.191.56.144 attackspam
Nov 30 21:39:05 webhost01 sshd[1104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.56.144
Nov 30 21:39:07 webhost01 sshd[1104]: Failed password for invalid user shenoy from 94.191.56.144 port 41534 ssh2
...
2019-11-30 22:45:17
61.177.172.158 attackbots
2019-11-30T14:37:23.325216hub.schaetter.us sshd\[7456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.158  user=root
2019-11-30T14:37:25.048855hub.schaetter.us sshd\[7456\]: Failed password for root from 61.177.172.158 port 36523 ssh2
2019-11-30T14:37:27.271774hub.schaetter.us sshd\[7456\]: Failed password for root from 61.177.172.158 port 36523 ssh2
2019-11-30T14:37:30.098459hub.schaetter.us sshd\[7456\]: Failed password for root from 61.177.172.158 port 36523 ssh2
2019-11-30T14:38:46.429786hub.schaetter.us sshd\[7468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.158  user=root
...
2019-11-30 22:42:54
218.60.41.227 attackspambots
Nov 30 19:38:41 gw1 sshd[30718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.60.41.227
Nov 30 19:38:43 gw1 sshd[30718]: Failed password for invalid user prosperity from 218.60.41.227 port 57777 ssh2
...
2019-11-30 22:46:38
34.83.184.206 attack
Invalid user icq from 34.83.184.206 port 45844
2019-11-30 22:28:09
14.186.20.139 attackspam
Nov 30 01:10:18 penfold postfix/smtpd[2042]: warning: hostname static.vnpt.vn does not resolve to address 14.186.20.139
Nov 30 01:10:18 penfold postfix/smtpd[2042]: connect from unknown[14.186.20.139]
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.186.20.139
2019-11-30 22:10:05

Recently Reported IPs

189.156.4.9 189.238.231.12 136.35.110.145 216.24.251.243
189.132.75.167 121.230.106.107 106.120.173.89 58.250.125.129
190.184.231.2 106.120.173.62 189.131.93.52 169.229.195.87
180.76.84.65 137.226.209.133 180.76.35.87 180.76.255.186
180.76.23.187 137.226.208.150 189.149.169.227 201.121.38.90