Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 30.50.164.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44872
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;30.50.164.194.			IN	A

;; AUTHORITY SECTION:
.			511	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020021601 1800 900 604800 86400

;; Query time: 546 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 17 05:28:52 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 194.164.50.30.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 194.164.50.30.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
78.129.229.12 attackspambots
Jun 23 14:09:26 debian-2gb-nbg1-2 kernel: \[15172836.769827\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=78.129.229.12 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=53894 PROTO=TCP SPT=49989 DPT=28646 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-23 20:25:39
89.136.52.0 attack
Invalid user admin from 89.136.52.0 port 49509
2020-06-23 20:10:57
203.162.123.151 attackspam
Jun 23 06:42:22 master sshd[24534]: Failed password for invalid user zzx from 203.162.123.151 port 38318 ssh2
Jun 23 06:49:24 master sshd[24703]: Failed password for invalid user steam from 203.162.123.151 port 34824 ssh2
Jun 23 06:53:31 master sshd[24822]: Failed password for invalid user thh from 203.162.123.151 port 60218 ssh2
Jun 23 06:57:26 master sshd[24905]: Failed password for root from 203.162.123.151 port 57368 ssh2
Jun 23 07:01:30 master sshd[25418]: Failed password for root from 203.162.123.151 port 54530 ssh2
Jun 23 07:05:48 master sshd[25512]: Failed password for invalid user nn from 203.162.123.151 port 51696 ssh2
Jun 23 07:10:16 master sshd[25681]: Failed password for invalid user rdt from 203.162.123.151 port 48866 ssh2
Jun 23 07:14:16 master sshd[25768]: Failed password for root from 203.162.123.151 port 46038 ssh2
Jun 23 07:18:28 master sshd[25905]: Failed password for invalid user xiaolei from 203.162.123.151 port 43188 ssh2
2020-06-23 20:38:28
110.44.126.222 attackspambots
Jun 23 08:20:18 ny01 sshd[3214]: Failed password for root from 110.44.126.222 port 52331 ssh2
Jun 23 08:24:27 ny01 sshd[3735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.44.126.222
Jun 23 08:24:29 ny01 sshd[3735]: Failed password for invalid user tecnico from 110.44.126.222 port 52790 ssh2
2020-06-23 20:25:11
51.75.18.212 attack
2020-06-23T14:06:34.112309vps773228.ovh.net sshd[28430]: Failed password for root from 51.75.18.212 port 57060 ssh2
2020-06-23T14:09:40.001645vps773228.ovh.net sshd[28454]: Invalid user website from 51.75.18.212 port 58068
2020-06-23T14:09:40.017809vps773228.ovh.net sshd[28454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.ip-51-75-18.eu
2020-06-23T14:09:40.001645vps773228.ovh.net sshd[28454]: Invalid user website from 51.75.18.212 port 58068
2020-06-23T14:09:42.010991vps773228.ovh.net sshd[28454]: Failed password for invalid user website from 51.75.18.212 port 58068 ssh2
...
2020-06-23 20:18:12
46.38.150.37 attackbots
2020-06-23 12:36:06 auth_plain authenticator failed for (User) [46.38.150.37]: 535 Incorrect authentication data (set_id=orly@csmailer.org)
2020-06-23 12:36:58 auth_plain authenticator failed for (User) [46.38.150.37]: 535 Incorrect authentication data (set_id=montse@csmailer.org)
2020-06-23 12:37:48 auth_plain authenticator failed for (User) [46.38.150.37]: 535 Incorrect authentication data (set_id=letitia@csmailer.org)
2020-06-23 12:38:39 auth_plain authenticator failed for (User) [46.38.150.37]: 535 Incorrect authentication data (set_id=ter@csmailer.org)
2020-06-23 12:39:28 auth_plain authenticator failed for (User) [46.38.150.37]: 535 Incorrect authentication data (set_id=vikas@csmailer.org)
...
2020-06-23 20:41:08
157.50.165.23 attack
1592914168 - 06/23/2020 14:09:28 Host: 157.50.165.23/157.50.165.23 Port: 445 TCP Blocked
2020-06-23 20:15:44
185.139.68.209 attackspam
Jun 23 14:06:19 pornomens sshd\[27028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.139.68.209  user=root
Jun 23 14:06:21 pornomens sshd\[27028\]: Failed password for root from 185.139.68.209 port 48982 ssh2
Jun 23 14:09:19 pornomens sshd\[27059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.139.68.209  user=root
...
2020-06-23 20:31:24
185.220.100.252 attackbots
xmlrpc attack
2020-06-23 20:09:10
45.148.10.97 attackspambots
port scan and connect, tcp 465 (smtps)
2020-06-23 20:47:24
45.13.119.31 attack
(sshd) Failed SSH login from 45.13.119.31 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 23 14:16:57 amsweb01 sshd[4981]: Invalid user uftp from 45.13.119.31 port 39796
Jun 23 14:16:59 amsweb01 sshd[4981]: Failed password for invalid user uftp from 45.13.119.31 port 39796 ssh2
Jun 23 14:21:50 amsweb01 sshd[6008]: Invalid user simon from 45.13.119.31 port 47466
Jun 23 14:21:52 amsweb01 sshd[6008]: Failed password for invalid user simon from 45.13.119.31 port 47466 ssh2
Jun 23 14:24:37 amsweb01 sshd[6646]: Invalid user syed from 45.13.119.31 port 34344
2020-06-23 20:41:32
114.119.166.115 attackbotsspam
[Tue Jun 23 19:09:19.034084 2020] [:error] [pid 5996:tid 140192818956032] [client 114.119.166.115:38666] [client 114.119.166.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/robots.txt"] [unique_id "XvHw76umFxd0Crm1ySno3AAAAe8"]
...
2020-06-23 20:33:34
202.175.46.170 attackspambots
2020-06-23T15:09:06.165580mail.standpoint.com.ua sshd[6675]: Failed password for invalid user apple from 202.175.46.170 port 36076 ssh2
2020-06-23T15:12:26.597304mail.standpoint.com.ua sshd[7131]: Invalid user leonardo from 202.175.46.170 port 36814
2020-06-23T15:12:26.600485mail.standpoint.com.ua sshd[7131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=z46l170.static.ctm.net
2020-06-23T15:12:26.597304mail.standpoint.com.ua sshd[7131]: Invalid user leonardo from 202.175.46.170 port 36814
2020-06-23T15:12:28.406066mail.standpoint.com.ua sshd[7131]: Failed password for invalid user leonardo from 202.175.46.170 port 36814 ssh2
...
2020-06-23 20:20:15
61.180.78.248 attackspam
 TCP (SYN) 61.180.78.248:65253 -> port 23, len 40
2020-06-23 20:39:45
189.211.183.151 attackbotsspam
fail2ban -- 189.211.183.151
...
2020-06-23 20:48:23

Recently Reported IPs

24.66.126.165 168.163.33.34 125.74.207.208 16.216.86.138
94.91.246.55 78.124.214.51 183.158.74.167 51.22.36.70
108.251.119.211 191.233.32.167 218.84.104.36 64.39.57.215
46.100.52.231 172.40.60.144 31.189.227.252 178.93.101.76
207.180.193.140 69.177.189.55 141.211.251.91 122.93.201.232