Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Egypt

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.99.50.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27741
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.99.50.122.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 15:58:19 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 122.50.99.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 122.50.99.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.118.210.132 attack
1578605060 - 01/09/2020 22:24:20 Host: 113.118.210.132/113.118.210.132 Port: 445 TCP Blocked
2020-01-10 07:25:56
222.186.173.215 attack
Jan 10 00:13:58 minden010 sshd[4133]: Failed password for root from 222.186.173.215 port 51040 ssh2
Jan 10 00:14:06 minden010 sshd[4133]: Failed password for root from 222.186.173.215 port 51040 ssh2
Jan 10 00:14:10 minden010 sshd[4133]: Failed password for root from 222.186.173.215 port 51040 ssh2
Jan 10 00:14:10 minden010 sshd[4133]: error: maximum authentication attempts exceeded for root from 222.186.173.215 port 51040 ssh2 [preauth]
...
2020-01-10 07:20:37
212.170.50.203 attackspambots
Jan  9 22:48:25 *** sshd[23855]: User root from 212.170.50.203 not allowed because not listed in AllowUsers
2020-01-10 07:11:44
159.65.176.156 attack
Jan  9 22:49:53 host sshd[33121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.176.156  user=root
Jan  9 22:49:56 host sshd[33121]: Failed password for root from 159.65.176.156 port 47061 ssh2
...
2020-01-10 07:26:41
110.29.90.225 attackbots
Fail2Ban Ban Triggered
2020-01-10 07:50:33
68.15.179.61 attackbotsspam
scan z
2020-01-10 07:52:49
222.186.175.169 attackbotsspam
20/1/9@18:32:10: FAIL: Alarm-SSH address from=222.186.175.169
...
2020-01-10 07:38:25
218.92.0.184 attackbots
Jan 10 00:11:48 vps647732 sshd[12417]: Failed password for root from 218.92.0.184 port 34979 ssh2
Jan 10 00:12:01 vps647732 sshd[12417]: Failed password for root from 218.92.0.184 port 34979 ssh2
Jan 10 00:12:01 vps647732 sshd[12417]: error: maximum authentication attempts exceeded for root from 218.92.0.184 port 34979 ssh2 [preauth]
...
2020-01-10 07:15:05
198.108.67.51 attackspam
firewall-block, port(s): 12312/tcp
2020-01-10 07:43:57
171.228.245.133 attack
Honeypot attack, port: 445, PTR: dynamic-adsl.viettel.vn.
2020-01-10 07:35:32
119.236.243.78 attackspambots
Honeypot attack, port: 5555, PTR: n119236243078.netvigator.com.
2020-01-10 07:46:13
81.22.45.35 attackbots
Port scan on 46 port(s): 99 225 633 737 855 877 992 1240 1360 1450 2112 2230 2415 2545 3475 5430 6280 6455 7275 7557 7654 8150 8225 8350 8575 9340 11114 13136 15159 21213 22225 22227 22422 33311 33366 34264 35643 44442 44499 48666 48888 52894 53363 54632 55544 61949
2020-01-10 07:52:32
210.5.156.219 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-10 07:54:26
182.240.38.19 attack
Honeypot attack, port: 5555, PTR: PTR record not found
2020-01-10 07:48:55
68.183.167.145 attackbots
Jan  8 15:40:31 cumulus sshd[25609]: Invalid user backuppc from 68.183.167.145 port 53906
Jan  8 15:40:31 cumulus sshd[25609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.167.145
Jan  8 15:40:32 cumulus sshd[25609]: Failed password for invalid user backuppc from 68.183.167.145 port 53906 ssh2
Jan  8 15:40:33 cumulus sshd[25609]: Received disconnect from 68.183.167.145 port 53906:11: Bye Bye [preauth]
Jan  8 15:40:33 cumulus sshd[25609]: Disconnected from 68.183.167.145 port 53906 [preauth]
Jan  8 15:48:53 cumulus sshd[25921]: Invalid user ys from 68.183.167.145 port 56738
Jan  8 15:48:53 cumulus sshd[25921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.167.145
Jan  8 15:48:55 cumulus sshd[25921]: Failed password for invalid user ys from 68.183.167.145 port 56738 ssh2
Jan  8 15:48:55 cumulus sshd[25921]: Received disconnect from 68.183.167.145 port 56738:11: Bye Bye [prea........
-------------------------------
2020-01-10 07:43:38

Recently Reported IPs

197.72.217.95 176.176.234.255 140.124.30.238 48.132.243.15
50.156.178.62 165.209.34.72 131.22.66.72 56.138.103.73
8.40.19.251 65.172.61.142 91.14.208.90 3.7.51.72
122.179.148.254 20.144.27.242 61.63.205.61 6.98.236.183
244.104.199.92 119.118.82.194 226.246.124.150 57.127.89.73