Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Paris

Region: Île-de-France

Country: France

Internet Service Provider: Free

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.36.50.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16384
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.36.50.207.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031802 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 19 05:44:40 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 207.50.36.213.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 213.36.50.207.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
36.250.229.115 attackspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-27 00:27:51
45.129.33.59 attackspambots
SmallBizIT.US 8 packets to tcp(41004,41016,41031,41048,41060,41098,41107,41137)
2020-08-27 00:25:15
185.18.52.94 attackspam
 TCP (SYN,ACK) 185.18.52.94:80 -> port 3732, len 44
2020-08-26 23:56:47
213.128.88.99 attackbots
probes 18 times on the port 8080
2020-08-26 23:50:46
45.129.33.19 attack
SmallBizIT.US 8 packets to tcp(33105,33137,33147,33150,33166,33179,33185,33194)
2020-08-27 00:25:46
69.30.225.202 attackbotsspam
scans 2 times in preceeding hours on the ports (in chronological order) 1030 1717
2020-08-27 00:05:00
186.159.0.129 attack
Unauthorised access (Aug 26) SRC=186.159.0.129 LEN=40 TTL=235 ID=31474 DF TCP DPT=8080 WINDOW=14600 SYN
2020-08-26 23:45:57
218.89.241.68 attackbotsspam
scans 2 times in preceeding hours on the ports (in chronological order) 20229 20229
2020-08-26 23:50:27
138.197.89.212 attack
 TCP (SYN) 138.197.89.212:48259 -> port 29806, len 44
2020-08-26 23:43:27
95.217.196.32 attackbotsspam
2 Attack(s) Detected
[DoS Attack: SYN/ACK Scan] from source: 95.217.196.32, port 80, Wednesday, August 26, 2020 01:55:42

[DoS Attack: SYN/ACK Scan] from source: 95.217.196.32, port 80, Wednesday, August 26, 2020 01:47:33
2020-08-27 00:03:10
77.247.108.119 attack
Automatic report - Port Scan
2020-08-27 00:19:01
38.90.148.110 attack
Flask-IPban - exploit URL requested:/owa/auth/logon.aspx
2020-08-26 23:42:53
164.68.112.178 attack
 TCP (SYN) 164.68.112.178:48787 -> port 5902, len 44
2020-08-26 23:57:11
172.105.185.43 attack
scans once in preceeding hours on the ports (in chronological order) 8545 resulting in total of 2 scans from 172.104.0.0/15 block.
2020-08-27 00:12:59
103.145.13.12 attackspam
firewall-block, port(s): 50802/tcp
2020-08-27 00:02:17

Recently Reported IPs

221.191.25.139 177.150.36.253 35.173.66.111 247.140.207.209
157.246.28.127 104.15.201.100 119.175.75.110 214.99.46.176
193.58.103.216 73.130.15.45 43.143.184.145 77.152.141.102
120.149.153.209 70.199.65.221 37.57.228.187 237.57.159.93
123.176.187.160 75.65.228.88 133.227.99.68 97.66.17.109