Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: Tata Teleservices Ltd

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attack
Unauthorized connection attempt detected from IP address 202.149.220.50 to port 1433 [J]
2020-02-04 00:59:16
attackbotsspam
SMB Server BruteForce Attack
2020-01-13 14:23:48
attackspam
Fail2Ban Ban Triggered
2020-01-02 01:27:07
attackspambots
12/12/2019-07:25:19.918752 202.149.220.50 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-12-12 20:04:42
attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-24 01:34:11
attackbotsspam
Jul 19 21:32:50 localhost kernel: [14830563.336659] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=202.149.220.50 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x20 TTL=240 ID=3802 PROTO=TCP SPT=57800 DPT=445 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 19 21:32:50 localhost kernel: [14830563.336684] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=202.149.220.50 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x20 TTL=240 ID=3802 PROTO=TCP SPT=57800 DPT=445 SEQ=3357962009 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
2019-07-20 13:00:15
attack
Unauthorised access (Jul 19) SRC=202.149.220.50 LEN=40 PREC=0x20 TTL=238 ID=19163 TCP DPT=445 WINDOW=1024 SYN 
Unauthorised access (Jul 15) SRC=202.149.220.50 LEN=40 PREC=0x20 TTL=239 ID=63193 TCP DPT=445 WINDOW=1024 SYN
2019-07-19 13:48:53
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 202.149.220.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32372
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;202.149.220.50.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051201 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon May 13 12:03:36 CST 2019
;; MSG SIZE  rcvd: 118

Host info
50.220.149.202.in-addr.arpa domain name pointer static-50.220.149.202-tataidc.co.in.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
50.220.149.202.in-addr.arpa	name = static-50.220.149.202-tataidc.co.in.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
54.37.67.144 attack
Mar 26 18:43:40 mail sshd\[28161\]: Invalid user xuw from 54.37.67.144
Mar 26 18:43:40 mail sshd\[28161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.67.144
...
2020-03-27 06:59:32
49.233.140.233 attackspam
3x Failed Password
2020-03-27 06:42:25
91.248.188.53 attackbots
Mar 26 22:16:50 h2022099 sshd[6885]: Invalid user kmw from 91.248.188.53
Mar 26 22:16:52 h2022099 sshd[6885]: Failed password for invalid user kmw from 91.248.188.53 port 29694 ssh2
Mar 26 22:16:52 h2022099 sshd[6885]: Received disconnect from 91.248.188.53: 11: Bye Bye [preauth]
Mar 26 22:25:35 h2022099 sshd[8477]: Connection closed by 91.248.188.53 [preauth]
Mar 26 22:30:31 h2022099 sshd[9456]: Invalid user vkn from 91.248.188.53


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=91.248.188.53
2020-03-27 07:19:26
14.232.243.10 attackbots
2020-03-26T23:00:56.549186shield sshd\[23354\]: Invalid user fax from 14.232.243.10 port 44256
2020-03-26T23:00:56.554386shield sshd\[23354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.232.243.10
2020-03-26T23:00:58.841661shield sshd\[23354\]: Failed password for invalid user fax from 14.232.243.10 port 44256 ssh2
2020-03-26T23:07:08.275515shield sshd\[24848\]: Invalid user swyer from 14.232.243.10 port 54346
2020-03-26T23:07:08.285487shield sshd\[24848\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.232.243.10
2020-03-27 07:11:17
139.59.65.115 attackspam
Mar 26 22:13:54 pornomens sshd\[9805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.65.115  user=root
Mar 26 22:13:56 pornomens sshd\[9805\]: Failed password for root from 139.59.65.115 port 60426 ssh2
Mar 26 22:18:56 pornomens sshd\[9854\]: Invalid user cacti from 139.59.65.115 port 52306
Mar 26 22:18:56 pornomens sshd\[9854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.65.115
...
2020-03-27 06:58:39
223.71.167.164 attackbotsspam
223.71.167.164 was recorded 16 times by 3 hosts attempting to connect to the following ports: 2080,554,1344,41794,8291,10554,9595,9090,10162,37777,2628,175,9700,7474,6001,3702. Incident counter (4h, 24h, all-time): 16, 76, 4702
2020-03-27 06:57:09
51.75.248.241 attackbotsspam
Mar 26 22:08:19 Ubuntu-1404-trusty-64-minimal sshd\[12992\]: Invalid user hle from 51.75.248.241
Mar 26 22:08:19 Ubuntu-1404-trusty-64-minimal sshd\[12992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.248.241
Mar 26 22:08:21 Ubuntu-1404-trusty-64-minimal sshd\[12992\]: Failed password for invalid user hle from 51.75.248.241 port 37876 ssh2
Mar 26 22:18:55 Ubuntu-1404-trusty-64-minimal sshd\[20284\]: Invalid user yfh from 51.75.248.241
Mar 26 22:18:55 Ubuntu-1404-trusty-64-minimal sshd\[20284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.248.241
2020-03-27 07:00:24
107.170.249.6 attack
SSH Invalid Login
2020-03-27 06:48:29
140.249.18.118 attackbotsspam
SSH Invalid Login
2020-03-27 06:45:06
186.168.5.222 attackspambots
Mar 26 23:59:11 host01 sshd[23833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.168.5.222 
Mar 26 23:59:13 host01 sshd[23833]: Failed password for invalid user baz from 186.168.5.222 port 17025 ssh2
Mar 27 00:03:21 host01 sshd[24727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.168.5.222 
...
2020-03-27 07:17:34
91.239.234.14 attackspambots
The server behind this IP hosts deceptive web pages, pretending to be a major Bulgarian bank, which is used for email phishing - https://dskbank.co.ua/F4HQY3zoCPexSMW/page/
2020-03-27 07:13:22
46.218.7.227 attack
2020-03-26T22:15:02.826385v22018076590370373 sshd[13896]: Invalid user william from 46.218.7.227 port 51551
2020-03-26T22:15:02.832899v22018076590370373 sshd[13896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.218.7.227
2020-03-26T22:15:02.826385v22018076590370373 sshd[13896]: Invalid user william from 46.218.7.227 port 51551
2020-03-26T22:15:05.161917v22018076590370373 sshd[13896]: Failed password for invalid user william from 46.218.7.227 port 51551 ssh2
2020-03-26T22:19:08.184549v22018076590370373 sshd[28678]: Invalid user vgy from 46.218.7.227 port 57996
...
2020-03-27 06:50:41
210.249.92.244 attackspambots
Invalid user testgay from 210.249.92.244 port 55008
2020-03-27 07:02:59
106.12.192.27 attackspam
2020-03-26T22:07:06.433790rocketchat.forhosting.nl sshd[7662]: Invalid user nn from 106.12.192.27 port 39742
2020-03-26T22:07:08.418320rocketchat.forhosting.nl sshd[7662]: Failed password for invalid user nn from 106.12.192.27 port 39742 ssh2
2020-03-26T22:18:52.696291rocketchat.forhosting.nl sshd[7956]: Invalid user lqj from 106.12.192.27 port 43916
...
2020-03-27 07:05:10
178.62.23.60 attackbotsspam
Mar 26 23:21:35 OPSO sshd\[25260\]: Invalid user thc from 178.62.23.60 port 60694
Mar 26 23:21:35 OPSO sshd\[25260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.23.60
Mar 26 23:21:37 OPSO sshd\[25260\]: Failed password for invalid user thc from 178.62.23.60 port 60694 ssh2
Mar 26 23:29:27 OPSO sshd\[27166\]: Invalid user ggy from 178.62.23.60 port 46340
Mar 26 23:29:27 OPSO sshd\[27166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.23.60
2020-03-27 06:52:40

Recently Reported IPs

52.14.193.108 14.153.238.109 224.57.105.115 78.85.13.122
174.224.139.222 70.113.180.77 117.2.228.118 35.47.217.35
56.136.102.217 135.19.70.219 156.212.66.200 31.85.37.71
103.84.245.61 84.25.81.106 69.12.86.217 184.106.124.96
209.85.210.195 109.175.130.238 202.39.58.169 195.240.32.110