Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.219.75.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20994
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.219.75.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 07:00:45 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 50.75.219.220.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.75.219.220.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
189.243.155.136 attackbotsspam
Honeypot attack, port: 445, PTR: dsl-189-243-155-136-dyn.prod-infinitum.com.mx.
2019-06-26 07:44:41
82.80.249.249 attack
(mod_security) mod_security (id:211290) triggered by 82.80.249.249 (IL/Israel/bzq-82-80-249-249.dcenter.bezeqint.net): 5 in the last 3600 secs
2019-06-26 07:50:22
159.65.149.131 attackspam
Invalid user music from 159.65.149.131 port 33273
2019-06-26 08:22:36
107.170.192.217 attackspambots
IP: 107.170.192.217
ASN: AS14061 DigitalOcean LLC
Port: World Wide Web HTTP 80
Date: 25/06/2019 7:40:12 PM UTC
2019-06-26 08:03:21
75.119.209.236 attackspam
TCP src-port=37828   dst-port=25    dnsbl-sorbs abuseat-org barracuda       (Project Honey Pot rated Suspicious)   (1195)
2019-06-26 07:57:28
104.216.143.210 attackspambots
Jun 24 21:46:09 Serveur sshd[24535]: Invalid user gambaa from 104.216.143.210 port 45198
Jun 24 21:46:09 Serveur sshd[24535]: Failed password for invalid user gambaa from 104.216.143.210 port 45198 ssh2
Jun 24 21:46:09 Serveur sshd[24535]: Received disconnect from 104.216.143.210 port 45198:11: Bye Bye [preauth]
Jun 24 21:46:09 Serveur sshd[24535]: Disconnected from invalid user gambaa 104.216.143.210 port 45198 [preauth]
Jun 25 01:02:45 Serveur sshd[30112]: Invalid user jn from 104.216.143.210 port 52868
Jun 25 01:02:45 Serveur sshd[30112]: Failed password for invalid user jn from 104.216.143.210 port 52868 ssh2
Jun 25 01:02:45 Serveur sshd[30112]: Received disconnect from 104.216.143.210 port 52868:11: Bye Bye [preauth]
Jun 25 01:02:45 Serveur sshd[30112]: Disconnected from invalid user jn 104.216.143.210 port 52868 [preauth]
Jun 25 01:05:01 Serveur sshd[31464]: Invalid user teacher from 104.216.143.210 port 42402
Jun 25 01:05:01 Serveur sshd[31464]: Failed password f........
-------------------------------
2019-06-26 08:01:48
200.69.78.18 attack
TCP src-port=49841   dst-port=25    dnsbl-sorbs abuseat-org barracuda       (Project Honey Pot rated Suspicious)   (1199)
2019-06-26 07:48:20
209.3.128.202 attackspam
Honeypot attack, port: 81, PTR: 2093128202.mnisoftware.com.
2019-06-26 07:42:20
211.149.239.26 attackspam
9200/tcp 8088/tcp 8080/tcp...
[2019-04-26/06-25]13pkt,5pt.(tcp)
2019-06-26 07:43:46
181.114.233.25 attackbots
Unauthorized connection attempt from IP address 181.114.233.25 on Port 445(SMB)
2019-06-26 08:11:44
177.99.197.111 attack
Jun 25 19:11:52 icinga sshd[30428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.99.197.111
Jun 25 19:11:54 icinga sshd[30428]: Failed password for invalid user luser from 177.99.197.111 port 40265 ssh2
...
2019-06-26 07:54:22
212.108.148.150 attack
Jun 25 20:01:14 pl3server sshd[2111310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.108.148.150  user=r.r
Jun 25 20:01:16 pl3server sshd[2111310]: Failed password for r.r from 212.108.148.150 port 37483 ssh2
Jun 25 20:01:17 pl3server sshd[2111310]: Failed password for r.r from 212.108.148.150 port 37483 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=212.108.148.150
2019-06-26 08:08:58
148.72.206.47 attackspambots
TCP src-port=40206   dst-port=25    dnsbl-sorbs abuseat-org barracuda       (Project Honey Pot rated Suspicious)   (1189)
2019-06-26 08:12:04
196.52.43.103 attackspambots
Honeypot attack, port: 389, PTR: 196.52.43.103.netsystemsresearch.com.
2019-06-26 08:03:56
121.132.17.79 attackspam
Jun 25 23:23:34 tanzim-HP-Z238-Microtower-Workstation sshd\[16488\]: Invalid user vftp from 121.132.17.79
Jun 25 23:23:34 tanzim-HP-Z238-Microtower-Workstation sshd\[16488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.17.79
Jun 25 23:23:37 tanzim-HP-Z238-Microtower-Workstation sshd\[16488\]: Failed password for invalid user vftp from 121.132.17.79 port 34078 ssh2
...
2019-06-26 08:05:04

Recently Reported IPs

56.143.54.38 230.237.150.156 132.134.249.165 214.19.218.212
173.78.151.206 141.91.27.128 69.33.145.179 239.78.134.68
150.3.250.185 83.60.159.161 217.2.226.28 172.225.39.247
223.185.125.44 57.104.68.99 222.99.159.139 223.139.65.51
149.62.132.48 150.90.175.120 63.89.58.203 145.195.254.83