Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 249.145.212.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8141
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;249.145.212.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 13:17:06 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 50.212.145.249.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.212.145.249.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
76.174.32.75 attackbotsspam
81/tcp
[2019-09-02]1pkt
2019-09-03 04:28:44
164.132.97.196 attackbots
Sep  2 21:26:43 MK-Soft-Root2 sshd\[31188\]: Invalid user public from 164.132.97.196 port 57682
Sep  2 21:26:43 MK-Soft-Root2 sshd\[31188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.97.196
Sep  2 21:26:45 MK-Soft-Root2 sshd\[31188\]: Failed password for invalid user public from 164.132.97.196 port 57682 ssh2
...
2019-09-03 04:31:40
77.120.228.177 attack
postfix/smtpd\[9399\]: NOQUEUE: reject: RCPT from unknown\[77.120.228.177\]: 554 5.7.1 Service Client host \[77.120.228.177\] blocked using sbl-xbl.spamhaus.org\;
2019-09-03 04:52:17
41.224.247.251 attackbots
445/tcp
[2019-09-02]1pkt
2019-09-03 04:57:05
112.97.53.28 attackbots
IP reached maximum auth failures
2019-09-03 04:20:00
62.234.91.237 attackspambots
Sep  2 14:14:44 ip-172-31-1-72 sshd\[11772\]: Invalid user redmine from 62.234.91.237
Sep  2 14:14:44 ip-172-31-1-72 sshd\[11772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.91.237
Sep  2 14:14:46 ip-172-31-1-72 sshd\[11772\]: Failed password for invalid user redmine from 62.234.91.237 port 59369 ssh2
Sep  2 14:18:42 ip-172-31-1-72 sshd\[11845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.91.237  user=root
Sep  2 14:18:44 ip-172-31-1-72 sshd\[11845\]: Failed password for root from 62.234.91.237 port 45914 ssh2
2019-09-03 05:06:29
157.230.190.1 attackspambots
Sep  2 16:22:15 ny01 sshd[8682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.190.1
Sep  2 16:22:17 ny01 sshd[8682]: Failed password for invalid user gw from 157.230.190.1 port 45766 ssh2
Sep  2 16:26:41 ny01 sshd[9721]: Failed password for root from 157.230.190.1 port 33916 ssh2
2019-09-03 04:28:18
198.108.66.30 attackbotsspam
" "
2019-09-03 04:22:48
34.221.170.50 attackspambots
xmlrpc attack
2019-09-03 04:31:18
116.0.37.6 attack
445/tcp
[2019-09-02]1pkt
2019-09-03 04:43:38
220.164.2.71 attackbotsspam
[munged]::443 220.164.2.71 - - [02/Sep/2019:15:13:00 +0200] "POST /[munged]: HTTP/1.1" 200 9039 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 220.164.2.71 - - [02/Sep/2019:15:13:02 +0200] "POST /[munged]: HTTP/1.1" 200 4378 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 220.164.2.71 - - [02/Sep/2019:15:13:05 +0200] "POST /[munged]: HTTP/1.1" 200 4378 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 220.164.2.71 - - [02/Sep/2019:15:13:06 +0200] "POST /[munged]: HTTP/1.1" 200 4378 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 220.164.2.71 - - [02/Sep/2019:15:13:07 +0200] "POST /[munged]: HTTP/1.1" 200 4378 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 220.164.2.71 - - [02/Sep/2019:15:13:10 +0200]
2019-09-03 04:59:30
42.112.27.171 attack
Sep  3 00:03:33 areeb-Workstation sshd[26233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.112.27.171
Sep  3 00:03:34 areeb-Workstation sshd[26233]: Failed password for invalid user administracion from 42.112.27.171 port 46818 ssh2
...
2019-09-03 04:25:45
51.254.248.18 attackbots
Brute force attempt
2019-09-03 04:42:03
144.131.134.105 attackspambots
Sep  2 10:41:52 hpm sshd\[28352\]: Invalid user openldap from 144.131.134.105
Sep  2 10:41:52 hpm sshd\[28352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe-144-131-134-105.static.nsw.bigpond.net.au
Sep  2 10:41:54 hpm sshd\[28352\]: Failed password for invalid user openldap from 144.131.134.105 port 45598 ssh2
Sep  2 10:48:30 hpm sshd\[28841\]: Invalid user school from 144.131.134.105
Sep  2 10:48:30 hpm sshd\[28841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe-144-131-134-105.static.nsw.bigpond.net.au
2019-09-03 04:50:19
51.75.65.209 attack
2019-09-02T20:31:43.307894abusebot-8.cloudsearch.cf sshd\[7931\]: Invalid user wx from 51.75.65.209 port 57484
2019-09-03 04:33:30

Recently Reported IPs

241.126.222.19 230.18.36.115 140.22.47.19 28.224.5.206
108.159.66.196 156.188.62.98 145.120.173.106 213.91.93.12
209.123.91.231 155.107.1.209 116.208.227.181 218.23.248.89
130.103.196.83 143.143.213.145 179.127.11.156 153.108.157.172
55.137.200.233 161.52.199.157 204.21.8.36 228.124.84.21