Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.65.85.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38040
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;3.65.85.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 12:58:26 CST 2025
;; MSG SIZE  rcvd: 103
Host info
50.85.65.3.in-addr.arpa domain name pointer ec2-3-65-85-50.eu-central-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.85.65.3.in-addr.arpa	name = ec2-3-65-85-50.eu-central-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.173.215 attackspambots
Tried sshing with brute force.
2020-02-01 06:08:06
178.128.7.249 attack
Unauthorized connection attempt detected from IP address 178.128.7.249 to port 2220 [J]
2020-02-01 05:16:51
194.67.208.212 attack
Invalid user ubuntu from 194.67.208.212 port 45308
2020-02-01 05:16:27
3.104.65.30 attack
Unauthorized connection attempt detected from IP address 3.104.65.30 to port 80 [T]
2020-02-01 05:20:29
218.92.0.148 attackspam
Feb  1 03:03:09 gw1 sshd[28842]: Failed password for root from 218.92.0.148 port 45142 ssh2
Feb  1 03:03:12 gw1 sshd[28842]: Failed password for root from 218.92.0.148 port 45142 ssh2
...
2020-02-01 06:14:18
212.3.142.0 attack
1580491647 - 01/31/2020 18:27:27 Host: 212.3.142.0/212.3.142.0 Port: 445 TCP Blocked
2020-02-01 05:20:55
154.209.4.116 attackbotsspam
Feb  1 00:30:46 server sshd\[17490\]: Invalid user admin from 154.209.4.116
Feb  1 00:30:46 server sshd\[17490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.209.4.116 
Feb  1 00:30:48 server sshd\[17490\]: Failed password for invalid user admin from 154.209.4.116 port 47240 ssh2
Feb  1 00:35:00 server sshd\[18014\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.209.4.116  user=ftp
Feb  1 00:35:03 server sshd\[18014\]: Failed password for ftp from 154.209.4.116 port 50266 ssh2
...
2020-02-01 06:20:41
24.106.125.38 attack
1433/tcp 445/tcp...
[2019-12-01/2020-01-31]10pkt,2pt.(tcp)
2020-02-01 06:24:36
218.92.0.175 attack
Feb  1 00:35:03 server sshd\[18078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.175  user=root
Feb  1 00:35:06 server sshd\[18078\]: Failed password for root from 218.92.0.175 port 36053 ssh2
Feb  1 00:35:09 server sshd\[18078\]: Failed password for root from 218.92.0.175 port 36053 ssh2
Feb  1 00:35:12 server sshd\[18078\]: Failed password for root from 218.92.0.175 port 36053 ssh2
Feb  1 00:35:16 server sshd\[18078\]: Failed password for root from 218.92.0.175 port 36053 ssh2
...
2020-02-01 06:09:16
193.32.163.123 attackbots
Jan 31 20:50:18 thevastnessof sshd[20221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.163.123
...
2020-02-01 05:27:03
69.158.97.49 attackbots
(From reeves.molly@hotmail.com) How would you like to post your ad on thousands of advertising sites every month? Pay one low monthly fee and get virtually unlimited traffic to your site forever! For more information just visit: http://www.moreadsposted.xyz
2020-02-01 06:19:00
112.72.92.169 attackspam
Unauthorized connection attempt detected from IP address 112.72.92.169 to port 23 [J]
2020-02-01 06:26:16
52.47.178.224 attackbots
port scan and connect, tcp 80 (http)
2020-02-01 06:11:48
104.156.250.136 attackspam
Jan 31 22:13:39 debian-2gb-nbg1-2 kernel: \[2764478.110414\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=104.156.250.136 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=53719 PROTO=TCP SPT=53348 DPT=16985 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-01 05:28:13
183.82.62.166 attackbotsspam
Unauthorized connection attempt detected from IP address 183.82.62.166 to port 88 [J]
2020-02-01 05:21:20

Recently Reported IPs

87.72.188.6 205.27.26.30 80.43.228.39 226.134.179.202
254.129.250.180 80.20.163.104 188.153.190.78 122.61.239.61
44.94.141.172 41.245.30.1 131.73.55.5 36.159.55.224
47.254.233.48 209.220.46.145 232.194.216.210 206.206.183.185
87.18.63.223 214.188.144.214 168.85.223.210 207.27.247.192