Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Turkey

Internet Service Provider: Meric Hosting

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspam
Mar 16 15:41:58  exim[19310]: [1\50] 1jDqwG-00051S-SV H=fair.isefardi.com (fair.callbite.com) [194.146.50.49] F= rejected after DATA: This message scored 102.7 spam points.
2020-03-17 02:23:22
Comments on same subnet:
IP Type Details Datetime
194.146.50.47 attackbotsspam
POSTFIX Brute-Force attempt
2020-09-25 02:21:33
194.146.50.47 attackbots
POSTFIX Brute-Force attempt
2020-09-24 18:02:14
194.146.50.59 attack
2020-07-06T05:51:28+02:00  exim[18575]: [1\50] 1jsIA9-0004pb-Sh H=zany.isefardi.com (zany.iiswdelhi.com) [194.146.50.59] F= rejected after DATA: This message scored 102.4 spam points.
2020-07-06 15:13:47
194.146.50.51 attack
2020-07-05T05:51:14+02:00  exim[25688]: [1\50] 1jrvgM-0006gK-DE H=push.isefardi.com (push.iiswdelhi.com) [194.146.50.51] F= rejected after DATA: This message scored 101.7 spam points.
2020-07-05 16:32:32
194.146.50.42 attack
May 11 14:53:12 *** postfix/smtpd[6333]: connect from advise.isefardi.com[194.146.50.42]
May x@x
May 11 14:53:12 *** postfix/smtpd[6333]: disconnect from advise.isefardi.com[194.146.50.42]
May 11 14:53:14 *** postfix/smtpd[6333]: connect from advise.isefardi.com[194.146.50.42]
May x@x
May 11 14:53:14 *** postfix/smtpd[6333]: disconnect from advise.isefardi.com[194.146.50.42]
May 11 14:53:39 *** postfix/smtpd[6333]: connect from advise.isefardi.com[194.146.50.42]
May x@x
May 11 14:53:39 *** postfix/smtpd[6333]: disconnect from advise.isefardi.com[194.146.50.42]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=194.146.50.42
2020-05-12 02:05:29
194.146.50.59 attackbots
Apr 15 05:54:23  exim[20709]: [1\48] 1jOZ80-0005O1-5h H=zany.isefardi.com (zany.callbite.com) [194.146.50.59] F= rejected after DATA: This message scored 101.1 spam points.
2020-04-15 15:34:39
194.146.50.35 attack
Apr 12 05:51:58  exim[6986]: [1\48] 1jNTf3-0001og-9e H=shut.isefardi.com (shut.callbite.com) [194.146.50.35] F= rejected after DATA: This message scored 101.1 spam points.
2020-04-12 17:01:51
194.146.50.56 attackbots
SpamScore above: 10.0
2020-04-11 14:12:32
194.146.50.59 attackspam
SpamScore above: 10.0
2020-04-08 15:12:54
194.146.50.46 attackspam
SpamScore above: 10.0
2020-04-07 09:31:55
194.146.50.38 attack
SpamScore above: 10.0
2020-04-03 17:33:28
194.146.50.59 attackspambots
SpamScore above: 10.0
2020-03-26 15:10:28
194.146.50.36 attackspambots
Mar 12 04:47:06  exim[26091]: [1\51] 1jCEoL-0006mp-Gi H=(unnatural.callbite.com) [194.146.50.36] F= rejected after DATA: This message scored 103.0 spam points.
2020-03-12 18:34:15
194.146.50.45 attackspam
Mar  9 04:43:22  exim[13143]: [1\45] 1jB9K5-0003Pz-Gr H=oxidation.isefardi.com (oxidation.callbite.com) [194.146.50.45] F= rejected after DATA: This message scored 100.5 spam points.
2020-03-09 20:12:40
194.146.50.58 attack
Mar  8 05:50:13 grey postfix/smtpd\[1176\]: NOQUEUE: reject: RCPT from stale.isefardi.com\[194.146.50.58\]: 554 5.7.1 Service unavailable\; Client host \[194.146.50.58\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[194.146.50.58\]\; from=\ to=\ proto=ESMTP helo=\Mar  8 05:50:13 grey postfix/smtpd\[1336\]: NOQUEUE: reject: RCPT from stale.isefardi.com\[194.146.50.58\]: 554 5.7.1 Service unavailable\; Client host \[194.146.50.58\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[194.146.50.58\]\; from=\ to=\ proto=ESMTP helo=\Mar  8 05:50:13 grey postfix/smtpd\[28174\]: NOQUEUE: reject: RCPT from stale.isefardi.com\[194.146.50.58\]: 554 5.7.1 Service unavailable\; Client host \[194.146.50.58\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[194.146.50.58\]\; from=\
2020-03-08 19:22:46
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.146.50.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50351
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;194.146.50.49.			IN	A

;; AUTHORITY SECTION:
.			284	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020031601 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 17 02:23:16 CST 2020
;; MSG SIZE  rcvd: 117
Host info
49.50.146.194.in-addr.arpa has no PTR record
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.50.146.194.in-addr.arpa	name = fair.isefardi.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.0.4.31 attackbotsspam
Unauthorized connection attempt detected from IP address 106.0.4.31 to port 1433 [J]
2020-01-05 04:38:23
202.9.46.219 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 04-01-2020 13:10:24.
2020-01-05 04:47:45
27.78.134.44 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 04-01-2020 13:10:25.
2020-01-05 04:45:16
115.236.100.57 attackbots
Unauthorized connection attempt detected from IP address 115.236.100.57 to port 445 [J]
2020-01-05 05:01:27
192.161.85.50 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 04-01-2020 13:10:23.
2020-01-05 04:50:15
142.79.94.24 attackspam
Unauthorized connection attempt detected from IP address 142.79.94.24 to port 81 [J]
2020-01-05 04:59:57
89.201.193.29 attackbotsspam
Unauthorized connection attempt detected from IP address 89.201.193.29 to port 23 [J]
2020-01-05 05:05:09
138.68.4.198 attackspambots
Unauthorized connection attempt detected from IP address 138.68.4.198 to port 2220 [J]
2020-01-05 05:00:40
185.251.38.4 attackspam
0,16-01/03 [bc01/m33] PostRequest-Spammer scoring: luanda
2020-01-05 04:54:17
91.165.142.97 attack
Telnet Server BruteForce Attack
2020-01-05 05:04:19
188.10.245.34 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 04-01-2020 13:10:23.
2020-01-05 04:52:22
41.41.203.83 attack
Unauthorized connection attempt detected from IP address 41.41.203.83 to port 445 [J]
2020-01-05 04:43:33
71.47.252.26 attackbotsspam
Unauthorized connection attempt detected from IP address 71.47.252.26 to port 23 [J]
2020-01-05 05:09:02
151.234.140.74 attackbotsspam
Unauthorized connection attempt detected from IP address 151.234.140.74 to port 80 [J]
2020-01-05 04:34:33
87.246.136.181 attackbots
Unauthorized connection attempt detected from IP address 87.246.136.181 to port 23 [J]
2020-01-05 04:39:28

Recently Reported IPs

236.114.128.234 212.80.251.217 37.237.142.3 245.95.242.198
222.40.97.100 230.118.6.12 76.176.108.246 1.173.170.253
83.233.192.73 4.115.139.220 220.80.229.69 81.215.233.202
251.49.13.101 104.227.245.91 197.52.20.126 103.130.141.138
96.13.97.246 244.226.226.71 144.217.178.248 118.144.11.142