Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.50.102.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46854
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;192.50.102.172.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 16:07:47 CST 2025
;; MSG SIZE  rcvd: 107
Host info
172.102.50.192.in-addr.arpa domain name pointer eduroam-192-50-102-172.net.shiga-u.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
172.102.50.192.in-addr.arpa	name = eduroam-192-50-102-172.net.shiga-u.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.19.87.225 attack
Joomla Brute Force
2019-06-26 05:26:57
89.248.162.168 attackbotsspam
25.06.2019 20:30:48 Connection to port 41398 blocked by firewall
2019-06-26 05:42:11
45.230.91.77 attackbots
imap. Unknown user
2019-06-26 05:28:35
66.11.32.201 attackbots
imap. Unknown user
2019-06-26 05:22:37
27.54.184.196 attack
ssh failed login
2019-06-26 05:39:20
196.31.146.252 attackbots
445/tcp 445/tcp 445/tcp...
[2019-04-27/06-25]4pkt,1pt.(tcp)
2019-06-26 05:53:07
111.75.167.157 attack
imap. Unknown user
2019-06-26 05:20:34
36.232.65.35 attackspambots
37215/tcp 37215/tcp
[2019-06-23/25]2pkt
2019-06-26 06:01:35
177.23.62.98 attack
SMTP-sasl brute force
...
2019-06-26 05:35:09
61.220.150.137 attack
445/tcp 445/tcp 445/tcp...
[2019-05-08/06-25]6pkt,1pt.(tcp)
2019-06-26 05:41:37
61.191.220.250 attackspam
imap. Unknown user
2019-06-26 05:28:18
190.10.8.97 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-05-12/06-25]8pkt,1pt.(tcp)
2019-06-26 05:21:41
5.188.86.114 attackspambots
Jun 25 21:45:37 h2177944 kernel: \[2835868.836820\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=5.188.86.114 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=27787 PROTO=TCP SPT=42373 DPT=30601 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 25 22:04:39 h2177944 kernel: \[2837010.387240\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=5.188.86.114 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=23390 PROTO=TCP SPT=42373 DPT=34014 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 25 22:17:19 h2177944 kernel: \[2837770.849450\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=5.188.86.114 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=54791 PROTO=TCP SPT=42373 DPT=26042 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 25 22:32:16 h2177944 kernel: \[2838667.968558\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=5.188.86.114 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=64114 PROTO=TCP SPT=42373 DPT=3134 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 25 22:45:48 h2177944 kernel: \[2839479.394854\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=5.188.86.114 DST=85.214.117.9 L
2019-06-26 05:50:43
222.168.6.250 attackbotsspam
$f2bV_matches
2019-06-26 05:45:58
186.249.217.119 attackspambots
25.06.2019 19:16:16 - Login Fail on hMailserver 
Detected by ELinOX-hMail-A2F
2019-06-26 05:14:32

Recently Reported IPs

98.204.119.199 138.215.178.166 66.198.110.248 229.95.133.213
35.82.90.85 144.100.147.79 86.252.191.107 219.20.46.116
194.236.25.52 163.206.43.167 118.193.166.120 238.160.27.121
69.47.106.232 137.49.197.241 142.160.236.187 199.105.60.99
214.87.232.207 166.119.25.252 74.46.254.205 249.220.117.116