Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Austin

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: University of Texas System

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.213.50.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64084
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;198.213.50.245.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081700 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Aug 18 03:44:22 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 245.50.213.198.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 245.50.213.198.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
154.8.232.205 attackspam
Dec 12 00:55:50 hpm sshd\[19882\]: Invalid user packet from 154.8.232.205
Dec 12 00:55:50 hpm sshd\[19882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.232.205
Dec 12 00:55:52 hpm sshd\[19882\]: Failed password for invalid user packet from 154.8.232.205 port 42158 ssh2
Dec 12 01:01:41 hpm sshd\[20410\]: Invalid user eliut from 154.8.232.205
Dec 12 01:01:41 hpm sshd\[20410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.232.205
2019-12-12 19:06:30
202.143.111.156 attackbotsspam
Dec 12 11:44:25 legacy sshd[31699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.143.111.156
Dec 12 11:44:27 legacy sshd[31699]: Failed password for invalid user mckissock from 202.143.111.156 port 52932 ssh2
Dec 12 11:51:33 legacy sshd[32078]: Failed password for root from 202.143.111.156 port 60866 ssh2
...
2019-12-12 19:05:09
139.59.18.215 attackbots
Dec 12 10:50:44 game-panel sshd[12071]: Failed password for dovecot from 139.59.18.215 port 60238 ssh2
Dec 12 10:56:44 game-panel sshd[12307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.18.215
Dec 12 10:56:45 game-panel sshd[12307]: Failed password for invalid user marquardt from 139.59.18.215 port 40302 ssh2
2019-12-12 19:14:00
209.17.96.98 attack
209.17.96.98 was recorded 11 times by 9 hosts attempting to connect to the following ports: 5903,9443,5984,30303,5632,5986,9002,3388,5909,6002. Incident counter (4h, 24h, all-time): 11, 42, 1528
2019-12-12 19:26:21
91.166.164.203 attack
Port Scan
2019-12-12 19:23:31
27.72.73.139 attackspam
1576131809 - 12/12/2019 07:23:29 Host: 27.72.73.139/27.72.73.139 Port: 445 TCP Blocked
2019-12-12 19:24:19
182.52.137.127 attack
1576131830 - 12/12/2019 07:23:50 Host: 182.52.137.127/182.52.137.127 Port: 445 TCP Blocked
2019-12-12 19:22:48
125.31.42.130 attackspambots
1576131889 - 12/12/2019 07:24:49 Host: 125.31.42.130/125.31.42.130 Port: 445 TCP Blocked
2019-12-12 19:06:56
195.202.66.183 attackspambots
Dec 12 11:32:38 localhost sshd\[10311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.202.66.183  user=root
Dec 12 11:32:40 localhost sshd\[10311\]: Failed password for root from 195.202.66.183 port 39530 ssh2
Dec 12 11:41:45 localhost sshd\[11255\]: Invalid user admin from 195.202.66.183 port 47848
2019-12-12 19:05:37
41.138.57.244 attack
firewall-block, port(s): 445/tcp
2019-12-12 19:07:34
54.37.149.102 attack
\[2019-12-12 06:23:30\] NOTICE\[2839\] chan_sip.c: Registration from '\' failed for '54.37.149.102:56499' - Wrong password
\[2019-12-12 06:23:30\] SECURITY\[2857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-12T06:23:30.706-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="45450",SessionID="0x7f0fb4987948",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/54.37.149.102/56499",Challenge="13422af4",ReceivedChallenge="13422af4",ReceivedHash="988ea5314d633b60e9ef84c1c14b9d63"
\[2019-12-12 06:23:48\] NOTICE\[2839\] chan_sip.c: Registration from '\' failed for '54.37.149.102:64959' - Wrong password
\[2019-12-12 06:23:48\] SECURITY\[2857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-12T06:23:48.041-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="19053",SessionID="0x7f0fb404fe78",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/54.37
2019-12-12 19:38:33
216.218.206.99 attackbotsspam
1576134302 - 12/12/2019 08:05:02 Host: scan-06h.shadowserver.org/216.218.206.99 Port: 111 UDP Blocked
2019-12-12 19:37:30
134.209.171.203 attackspambots
Dec 12 12:26:42 lnxmysql61 sshd[13488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.171.203
2019-12-12 19:35:45
103.206.137.14 attackbots
1576131766 - 12/12/2019 07:22:46 Host: 103.206.137.14/103.206.137.14 Port: 445 TCP Blocked
2019-12-12 19:34:45
68.183.134.134 attack
68.183.134.134 - - \[12/Dec/2019:07:25:32 +0100\] "POST /wp-login.php HTTP/1.0" 200 7524 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
68.183.134.134 - - \[12/Dec/2019:07:25:39 +0100\] "POST /wp-login.php HTTP/1.0" 200 7391 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
68.183.134.134 - - \[12/Dec/2019:07:25:45 +0100\] "POST /wp-login.php HTTP/1.0" 200 7387 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-12-12 19:25:43

Recently Reported IPs

38.176.13.63 168.245.82.137 125.109.244.139 191.210.90.120
31.252.217.92 212.118.174.72 44.138.187.97 66.249.69.63
65.111.163.120 97.146.177.70 195.5.149.36 105.48.215.224
150.41.208.47 86.20.97.248 59.46.184.202 136.174.88.90
138.94.217.97 158.194.52.36 53.90.154.156 162.243.90.219