Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.50.17.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59928
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.50.17.214.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020201 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 10:44:59 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 214.17.50.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.17.50.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
95.168.122.233 attack
SSH login attempts
2020-01-04 22:24:08
122.179.187.254 attackbots
Honeypot attack, port: 445, PTR: abts-mum-dynamic-254.187.179.122.airtelbroadband.in.
2020-01-04 22:38:10
186.145.254.148 attack
invalid login attempt (toor)
2020-01-04 22:40:45
49.88.112.62 attackbots
Jan  4 15:07:23 MK-Soft-Root2 sshd[10246]: Failed password for root from 49.88.112.62 port 56707 ssh2
Jan  4 15:07:27 MK-Soft-Root2 sshd[10246]: Failed password for root from 49.88.112.62 port 56707 ssh2
...
2020-01-04 22:19:53
64.41.82.7 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-04 22:08:13
164.52.24.172 attackspambots
Unauthorized connection attempt detected from IP address 164.52.24.172 to port 143 [J]
2020-01-04 22:08:48
122.51.233.63 attackbots
SSH Brute Force
2020-01-04 22:31:25
139.5.18.3 attack
Unauthorised access (Jan  4) SRC=139.5.18.3 LEN=52 TTL=110 ID=14868 DF TCP DPT=445 WINDOW=8192 SYN
2020-01-04 22:37:47
144.91.83.19 attackbots
01/04/2020-09:02:01.690295 144.91.83.19 Protocol: 17 ET SCAN Sipvicious User-Agent Detected (friendly-scanner)
2020-01-04 22:09:15
80.82.60.241 attackspam
Automatic report - SSH Brute-Force Attack
2020-01-04 22:39:38
111.119.219.90 attackspambots
Unauthorized connection attempt from IP address 111.119.219.90 on Port 445(SMB)
2020-01-04 22:04:28
139.28.223.181 attackbotsspam
Autoban   139.28.223.181 AUTH/CONNECT
2020-01-04 22:17:21
178.128.59.109 attack
Unauthorized connection attempt detected from IP address 178.128.59.109 to port 2220 [J]
2020-01-04 22:25:53
195.9.219.74 attack
20/1/4@08:15:02: FAIL: Alarm-Network address from=195.9.219.74
...
2020-01-04 22:21:28
94.53.245.228 attackspambots
Attempted to connect 2 times to port 23 TCP
2020-01-04 22:22:18

Recently Reported IPs

10.162.196.7 225.78.210.212 86.62.143.166 250.136.7.132
39.251.23.243 40.214.194.161 234.125.59.86 203.75.131.118
154.153.187.188 157.94.97.241 210.174.197.46 157.165.122.41
5.166.233.149 43.168.127.137 218.225.131.174 155.247.127.97
56.11.225.43 152.149.128.45 89.32.225.74 161.128.126.57