Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.50.13.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14783
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.50.13.78.			IN	A

;; AUTHORITY SECTION:
.			424	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021100 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 12 00:11:48 CST 2022
;; MSG SIZE  rcvd: 105
Host info
78.13.50.194.in-addr.arpa domain name pointer cgn-pool-194-50-13-78.tis-dialog.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
78.13.50.194.in-addr.arpa	name = cgn-pool-194-50-13-78.tis-dialog.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.59.53.34 attackspam
Unauthorised access (Aug 10) SRC=103.59.53.34 LEN=40 TOS=0x08 TTL=52 ID=15162 TCP DPT=8080 WINDOW=14095 SYN 
Unauthorised access (Aug 10) SRC=103.59.53.34 LEN=40 TOS=0x08 TTL=49 ID=16493 TCP DPT=8080 WINDOW=24970 SYN
2020-08-11 06:49:29
200.165.105.210 attack
Unauthorized connection attempt from IP address 200.165.105.210 on Port 445(SMB)
2020-08-11 06:31:04
46.101.212.57 attackspambots
Aug 10 20:31:18 scw-focused-cartwright sshd[3731]: Failed password for root from 46.101.212.57 port 44950 ssh2
2020-08-11 06:33:27
182.61.105.127 attackspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-11 06:36:18
94.19.29.200 attack
Port scan: Attack repeated for 24 hours
2020-08-11 06:35:37
129.204.42.144 attack
Aug 10 22:59:04 master sshd[12705]: Failed password for root from 129.204.42.144 port 38402 ssh2
Aug 10 23:09:51 master sshd[13268]: Failed password for root from 129.204.42.144 port 48378 ssh2
Aug 10 23:16:30 master sshd[13415]: Failed password for root from 129.204.42.144 port 59494 ssh2
Aug 10 23:22:57 master sshd[13533]: Failed password for root from 129.204.42.144 port 42382 ssh2
Aug 10 23:29:22 master sshd[14138]: Failed password for root from 129.204.42.144 port 53506 ssh2
2020-08-11 06:57:49
85.96.179.115 attackspambots
Automatic report - Port Scan Attack
2020-08-11 06:25:16
129.144.181.142 attackspambots
Aug 10 23:31:15 vpn01 sshd[22889]: Failed password for root from 129.144.181.142 port 57689 ssh2
...
2020-08-11 06:39:02
192.99.190.186 attackspambots
Time:     Mon Aug 10 17:26:34 2020 -0300
IP:       192.99.190.186 (CA/Canada/hostname.contato.legal)
Failures: 30 (smtpauth)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-08-11 06:36:06
213.14.242.70 attackspambots
Port Scan detected!
...
2020-08-11 06:27:41
189.128.75.76 attackspam
1597091380 - 08/10/2020 22:29:40 Host: 189.128.75.76/189.128.75.76 Port: 445 TCP Blocked
2020-08-11 06:53:39
220.132.232.230 attack
Auto Detect Rule!
proto TCP (SYN), 220.132.232.230:24643->gjan.info:23, len 40
2020-08-11 06:38:10
112.197.32.136 attack
Unauthorized connection attempt from IP address 112.197.32.136 on Port 445(SMB)
2020-08-11 06:41:28
187.190.48.196 attack
Auto Detect Rule!
proto TCP (SYN), 187.190.48.196:41933->gjan.info:23, len 40
2020-08-11 06:32:01
36.92.174.133 attackbots
Aug 11 00:43:20 vps647732 sshd[1218]: Failed password for root from 36.92.174.133 port 48767 ssh2
...
2020-08-11 06:47:33

Recently Reported IPs

194.50.15.4 194.99.26.225 194.99.26.239 194.99.26.26
195.133.249.58 195.154.185.10 195.158.92.127 195.154.199.17
195.181.84.157 195.20.219.145 195.248.185.224 195.58.57.55
195.72.237.198 195.33.208.242 195.68.137.66 195.90.200.188
196.191.67.172 196.1.238.234 196.191.67.209 196.1.240.98