Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.50.194.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52370
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;196.50.194.7.			IN	A

;; AUTHORITY SECTION:
.			429	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 11:45:06 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 7.194.50.196.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 7.194.50.196.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
138.204.179.162 attackbots
To many IMAP authentication failed, Brute Force on email accounts
2020-05-22 22:07:43
109.87.143.67 attackbots
Spam detected 2020.05.18 06:14:45
blocked until 2020.06.12 02:46:08
2020-05-22 22:10:06
87.251.74.48 attackbots
Unauthorized connection attempt detected from IP address 87.251.74.48 to port 3128
2020-05-22 21:47:15
185.100.87.242 attack
CMS (WordPress or Joomla) login attempt.
2020-05-22 21:54:15
45.148.10.86 attackbotsspam
Scan detected 2020.03.31 00:47:52
blocked until 2020.04.24 21:19:15
2020-05-22 22:24:51
180.165.48.111 attackspam
Invalid user vbo from 180.165.48.111 port 27297
2020-05-22 21:47:46
211.150.70.204 attack
Spam detected 2020.05.18 09:24:22
blocked until 2020.05.21 09:24:22
2020-05-22 22:00:34
195.112.197.19 attackspam
Spam detected 2020.05.18 14:11:10
blocked until 2020.06.12 10:42:33
2020-05-22 22:02:17
190.109.170.105 attackspambots
To many IMAP authentication failed, Brute Force on email accounts
2020-05-22 22:19:20
152.136.102.131 attack
Repeated brute force against a port
2020-05-22 21:45:53
80.211.225.143 attack
SSH Brute Force
2020-05-22 21:50:07
74.82.47.16 attackbotsspam
srv02 Mass scanning activity detected Target: 9200  ..
2020-05-22 22:26:39
103.145.12.128 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-22 21:49:50
167.99.75.240 attack
May 22 15:40:02 vpn01 sshd[15053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.75.240
May 22 15:40:03 vpn01 sshd[15053]: Failed password for invalid user ohk from 167.99.75.240 port 37252 ssh2
...
2020-05-22 22:29:59
45.70.204.254 attack
Spam detected 2020.05.17 05:28:50
blocked until 2020.06.11 02:00:13
2020-05-22 22:25:56

Recently Reported IPs

113.247.32.234 188.151.18.119 187.167.248.227 125.113.38.213
54.221.130.119 45.7.135.233 125.161.90.132 120.85.112.23
120.85.114.102 14.177.107.77 146.0.209.73 218.23.6.69
143.110.247.71 105.213.164.7 115.49.81.55 123.145.30.175
221.213.75.169 219.157.254.125 125.121.152.190 2.58.149.248