Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.199.45.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13142
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.199.45.50.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100700 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 15:07:12 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 50.45.199.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.45.199.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
40.73.7.218 attackbots
Oct 15 05:01:48 hcbbdb sshd\[19977\]: Invalid user ICPDB from 40.73.7.218
Oct 15 05:01:48 hcbbdb sshd\[19977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.7.218
Oct 15 05:01:50 hcbbdb sshd\[19977\]: Failed password for invalid user ICPDB from 40.73.7.218 port 60980 ssh2
Oct 15 05:07:09 hcbbdb sshd\[20549\]: Invalid user fuckall from 40.73.7.218
Oct 15 05:07:09 hcbbdb sshd\[20549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.7.218
2019-10-15 13:10:47
37.59.47.80 attackbotsspam
fail2ban honeypot
2019-10-15 13:20:31
94.237.76.100 attackspambots
Oct 14 18:41:07 kapalua sshd\[15078\]: Invalid user delinia from 94.237.76.100
Oct 14 18:41:07 kapalua sshd\[15078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94-237-76-100.sg-sin1.upcloud.host
Oct 14 18:41:09 kapalua sshd\[15078\]: Failed password for invalid user delinia from 94.237.76.100 port 56380 ssh2
Oct 14 18:45:35 kapalua sshd\[15456\]: Invalid user voipcat526202 from 94.237.76.100
Oct 14 18:45:35 kapalua sshd\[15456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94-237-76-100.sg-sin1.upcloud.host
2019-10-15 12:58:14
221.132.17.81 attack
Oct 14 18:47:25 eddieflores sshd\[28553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.132.17.81  user=root
Oct 14 18:47:27 eddieflores sshd\[28553\]: Failed password for root from 221.132.17.81 port 45868 ssh2
Oct 14 18:52:03 eddieflores sshd\[28908\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.132.17.81  user=root
Oct 14 18:52:05 eddieflores sshd\[28908\]: Failed password for root from 221.132.17.81 port 57412 ssh2
Oct 14 18:56:42 eddieflores sshd\[29289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.132.17.81  user=root
2019-10-15 13:07:21
190.39.37.78 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/190.39.37.78/ 
 VE - 1H : (24)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : VE 
 NAME ASN : ASN8048 
 
 IP : 190.39.37.78 
 
 CIDR : 190.39.32.0/19 
 
 PREFIX COUNT : 467 
 
 UNIQUE IP COUNT : 2731520 
 
 
 WYKRYTE ATAKI Z ASN8048 :  
  1H - 1 
  3H - 3 
  6H - 7 
 12H - 12 
 24H - 20 
 
 DateTime : 2019-10-15 05:53:51 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-15 12:44:20
39.71.168.242 attackbots
Unauthorised access (Oct 15) SRC=39.71.168.242 LEN=40 TTL=49 ID=8260 TCP DPT=8080 WINDOW=52569 SYN 
Unauthorised access (Oct 15) SRC=39.71.168.242 LEN=40 TTL=49 ID=33266 TCP DPT=8080 WINDOW=52569 SYN 
Unauthorised access (Oct 14) SRC=39.71.168.242 LEN=40 TTL=49 ID=59892 TCP DPT=8080 WINDOW=13399 SYN
2019-10-15 12:59:40
84.17.62.130 attackbotsspam
0,60-01/01 [bc01/m47] PostRequest-Spammer scoring: Lusaka02
2019-10-15 12:53:40
217.146.88.133 attackspam
Scanning and Vuln Attempts
2019-10-15 13:12:20
163.172.133.109 attack
2019-10-15T04:13:27.539743abusebot-6.cloudsearch.cf sshd\[27555\]: Invalid user pinapp from 163.172.133.109 port 44450
2019-10-15 12:43:43
106.12.190.104 attackbots
$f2bV_matches
2019-10-15 13:10:26
222.186.175.155 attack
Oct 15 10:44:08 areeb-Workstation sshd[16457]: Failed password for root from 222.186.175.155 port 43582 ssh2
Oct 15 10:44:12 areeb-Workstation sshd[16457]: Failed password for root from 222.186.175.155 port 43582 ssh2
...
2019-10-15 13:18:48
216.119.148.25 attack
Fake Tech support website. This was found by typing in url   fredmyer.com , instead of going to https://www.fredmyers.com
2019-10-15 12:46:04
88.84.200.139 attack
2019-10-15T01:04:35.743604ns525875 sshd\[19924\]: Invalid user vision from 88.84.200.139 port 38394
2019-10-15T01:04:35.749236ns525875 sshd\[19924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.84.200.139
2019-10-15T01:04:38.114128ns525875 sshd\[19924\]: Failed password for invalid user vision from 88.84.200.139 port 38394 ssh2
2019-10-15T01:08:29.770178ns525875 sshd\[24607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.84.200.139  user=root
...
2019-10-15 13:26:12
185.251.38.4 attackspam
0,13-00/01 [bc01/m23] PostRequest-Spammer scoring: brussels
2019-10-15 13:12:49
178.62.236.68 attack
[munged]::443 178.62.236.68 - - [15/Oct/2019:05:53:13 +0200] "POST /[munged]: HTTP/1.1" 200 6620 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-15 13:20:05

Recently Reported IPs

37.115.219.176 192.241.208.178 128.90.176.248 31.6.60.98
114.18.209.205 189.15.198.9 189.217.196.254 141.212.123.143
95.217.183.3 110.10.133.29 147.78.47.249 148.0.26.88
149.5.173.16 149.224.26.248 146.56.219.54 149.224.133.219
145.239.28.176 148.70.242.247 145.239.198.63 150.230.235.117