Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.134.249.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62686
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;218.134.249.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 20:29:51 CST 2025
;; MSG SIZE  rcvd: 107
Host info
50.249.134.218.in-addr.arpa domain name pointer softbank218134249050.bbtec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.249.134.218.in-addr.arpa	name = softbank218134249050.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
95.182.79.41 attackspambots
Automatic report - Banned IP Access
2019-09-15 06:46:09
157.245.104.124 attackbots
2019-09-14T20:57:43.015883vfs-server-01 sshd\[23630\]: Invalid user fake from 157.245.104.124 port 41642
2019-09-14T20:57:44.135388vfs-server-01 sshd\[23633\]: Invalid user ubnt from 157.245.104.124 port 43232
2019-09-14T20:57:46.394669vfs-server-01 sshd\[23638\]: Invalid user admin from 157.245.104.124 port 45768
2019-09-15 06:45:10
49.83.185.125 attackbotsspam
Sep 14 01:06:43 typhoon sshd[13121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.83.185.125  user=r.r
Sep 14 01:06:45 typhoon sshd[13121]: Failed password for r.r from 49.83.185.125 port 44734 ssh2
Sep 14 01:06:48 typhoon sshd[13121]: Failed password for r.r from 49.83.185.125 port 44734 ssh2
Sep 14 01:06:50 typhoon sshd[13121]: Failed password for r.r from 49.83.185.125 port 44734 ssh2
Sep 14 01:06:53 typhoon sshd[13121]: Failed password for r.r from 49.83.185.125 port 44734 ssh2
Sep 14 01:06:55 typhoon sshd[13121]: Failed password for r.r from 49.83.185.125 port 44734 ssh2
Sep 14 01:06:57 typhoon sshd[13121]: Failed password for r.r from 49.83.185.125 port 44734 ssh2
Sep 14 01:06:57 typhoon sshd[13121]: Disconnecting: Too many authentication failures for r.r from 49.83.185.125 port 44734 ssh2 [preauth]
Sep 14 01:06:57 typhoon sshd[13121]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.83........
-------------------------------
2019-09-15 06:31:32
106.12.11.33 attackbots
$f2bV_matches
2019-09-15 06:26:15
79.110.201.195 attack
Sep 14 20:17:09 mail sshd\[21093\]: Invalid user custlink from 79.110.201.195
Sep 14 20:17:09 mail sshd\[21093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.110.201.195
Sep 14 20:17:11 mail sshd\[21093\]: Failed password for invalid user custlink from 79.110.201.195 port 60776 ssh2
...
2019-09-15 06:39:57
218.92.0.144 attackbots
$f2bV_matches
2019-09-15 06:42:08
222.186.42.15 attackspambots
09/14/2019-18:33:40.136251 222.186.42.15 Protocol: 6 ET SCAN Potential SSH Scan
2019-09-15 06:35:02
2.231.46.155 attackbotsspam
Chat Spam
2019-09-15 06:21:27
222.186.31.145 attackspam
Sep 14 18:14:41 ny01 sshd[24131]: Failed password for root from 222.186.31.145 port 10886 ssh2
Sep 14 18:14:41 ny01 sshd[24132]: Failed password for root from 222.186.31.145 port 12945 ssh2
Sep 14 18:14:43 ny01 sshd[24131]: Failed password for root from 222.186.31.145 port 10886 ssh2
Sep 14 18:14:43 ny01 sshd[24132]: Failed password for root from 222.186.31.145 port 12945 ssh2
2019-09-15 06:15:43
202.29.98.39 attackbotsspam
2019-09-14T22:06:50.184389abusebot-7.cloudsearch.cf sshd\[3741\]: Invalid user vbox from 202.29.98.39 port 60792
2019-09-15 06:18:20
179.126.140.223 attackspambots
Automatic report - Port Scan Attack
2019-09-15 06:34:18
106.12.103.98 attackspam
Sep 15 00:49:17 server sshd\[10290\]: Invalid user ku from 106.12.103.98 port 52188
Sep 15 00:49:17 server sshd\[10290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.103.98
Sep 15 00:49:20 server sshd\[10290\]: Failed password for invalid user ku from 106.12.103.98 port 52188 ssh2
Sep 15 00:53:58 server sshd\[23930\]: Invalid user college from 106.12.103.98 port 38716
Sep 15 00:53:58 server sshd\[23930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.103.98
2019-09-15 06:07:35
2.50.162.210 attack
Automatic report - Port Scan Attack
2019-09-15 06:11:18
78.141.217.223 attack
RDP Bruteforce
2019-09-15 06:43:59
119.42.83.54 attackspambots
Chat Spam
2019-09-15 06:22:14

Recently Reported IPs

42.207.75.133 151.66.246.90 181.215.66.114 225.1.200.14
8.203.253.146 255.250.156.179 27.160.124.27 207.141.181.171
246.251.65.13 192.168.31.34 179.145.19.153 64.118.133.159
225.156.151.77 117.187.236.240 153.8.37.22 25.227.148.89
186.241.198.71 154.173.20.30 127.232.27.138 63.207.28.1