Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Durban

Region: KwaZulu-Natal

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.213.50.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32144
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;196.213.50.20.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062700 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 27 21:11:02 CST 2025
;; MSG SIZE  rcvd: 106
Host info
20.50.213.196.in-addr.arpa domain name pointer 196-213-50-20.static.isadsl.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.50.213.196.in-addr.arpa	name = 196-213-50-20.static.isadsl.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
124.207.98.213 attack
$f2bV_matches
2020-06-21 14:10:01
149.56.129.68 attack
Invalid user max from 149.56.129.68 port 39152
2020-06-21 13:46:41
61.255.239.24 attackbotsspam
Jun 21 05:50:01 gitlab-ci sshd\[8730\]: Invalid user lihan from 61.255.239.24Jun 21 05:59:30 gitlab-ci sshd\[8935\]: Invalid user yangbaoyue from 61.255.239.24
...
2020-06-21 14:20:05
86.120.40.75 attack
 TCP (SYN) 86.120.40.75:43003 -> port 23, len 44
2020-06-21 13:45:36
189.10.97.19 attack
06/20/2020-23:57:14.261488 189.10.97.19 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-06-21 14:01:48
192.99.212.132 attackbotsspam
Invalid user root1 from 192.99.212.132 port 51374
2020-06-21 14:14:40
112.85.42.200 attack
Jun 21 07:45:28 server sshd[16909]: Failed none for root from 112.85.42.200 port 36630 ssh2
Jun 21 07:45:31 server sshd[16909]: Failed password for root from 112.85.42.200 port 36630 ssh2
Jun 21 07:45:36 server sshd[16909]: Failed password for root from 112.85.42.200 port 36630 ssh2
2020-06-21 13:56:21
52.79.177.168 attack
Invalid user beatriz from 52.79.177.168 port 36886
2020-06-21 14:15:26
120.70.100.2 attackspam
Invalid user isseitkd from 120.70.100.2 port 46710
2020-06-21 13:52:33
61.160.96.90 attackspambots
SSH login attempts.
2020-06-21 13:52:09
139.155.39.111 attack
Invalid user 13 from 139.155.39.111 port 35786
2020-06-21 14:17:59
49.235.41.58 attackspam
Jun 21 07:57:24 * sshd[28803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.41.58
Jun 21 07:57:26 * sshd[28803]: Failed password for invalid user admin from 49.235.41.58 port 56795 ssh2
2020-06-21 14:01:07
183.89.191.184 attack
1592711833 - 06/21/2020 05:57:13 Host: 183.89.191.184/183.89.191.184 Port: 445 TCP Blocked
2020-06-21 14:03:51
117.51.142.192 attack
SSH login attempts.
2020-06-21 13:50:17
211.217.101.65 attackspam
Invalid user ping from 211.217.101.65 port 26119
2020-06-21 13:50:04

Recently Reported IPs

184.202.40.38 183.230.158.144 180.156.128.237 182.13.87.102
182.203.4.179 182.117.86.204 18.150.65.165 96.14.6.156
98.23.111.121 73.216.43.23 52.253.66.35 7.218.250.6
53.46.131.30 43.149.109.87 4.80.69.8 57.224.15.208
3.108.193.214 29.188.111.16 30.32.161.193 215.231.157.92