Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dongjak-gu

Region: Seoul Special City

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.142.181.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39944
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.142.181.50.			IN	A

;; AUTHORITY SECTION:
.			293	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022122700 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 27 20:00:19 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 50.181.142.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.181.142.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
177.21.195.122 attackspam
Brute force attempt
2020-10-11 12:58:15
106.75.169.106 attackspam
Oct 10 18:14:37 web9 sshd\[7815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.169.106  user=root
Oct 10 18:14:39 web9 sshd\[7815\]: Failed password for root from 106.75.169.106 port 58562 ssh2
Oct 10 18:19:06 web9 sshd\[8461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.169.106  user=root
Oct 10 18:19:08 web9 sshd\[8461\]: Failed password for root from 106.75.169.106 port 51250 ssh2
Oct 10 18:23:43 web9 sshd\[9150\]: Invalid user tokend from 106.75.169.106
2020-10-11 12:56:30
69.119.85.43 attack
(sshd) Failed SSH login from 69.119.85.43 (US/United States/ool-4577552b.dyn.optonline.net): 10 in the last 3600 secs
2020-10-11 13:28:25
119.45.12.105 attack
Invalid user admin from 119.45.12.105 port 47622
2020-10-11 13:06:51
119.45.187.6 attack
Oct 11 11:10:00 localhost sshd[3887329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.187.6  user=root
Oct 11 11:10:02 localhost sshd[3887329]: Failed password for root from 119.45.187.6 port 42154 ssh2
...
2020-10-11 12:57:40
139.217.218.93 attackbotsspam
Oct 10 17:25:52 pixelmemory sshd[4179150]: Failed password for root from 139.217.218.93 port 39378 ssh2
Oct 10 17:28:33 pixelmemory sshd[4194160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.218.93  user=root
Oct 10 17:28:35 pixelmemory sshd[4194160]: Failed password for root from 139.217.218.93 port 49982 ssh2
Oct 10 17:31:12 pixelmemory sshd[4074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.218.93  user=root
Oct 10 17:31:14 pixelmemory sshd[4074]: Failed password for root from 139.217.218.93 port 60574 ssh2
...
2020-10-11 13:21:04
166.168.3.163 attackbotsspam
Port Scan: TCP/443
2020-10-11 13:00:38
198.144.120.221 attackbots
20 attempts against mh-misbehave-ban on sonic
2020-10-11 13:10:51
47.5.149.25 attackbots
leo_www
2020-10-11 13:24:01
164.100.13.91 attackspambots
E-Mail Spam (RBL) [REJECTED]
2020-10-11 13:22:55
188.75.132.210 attack
Brute force attempt
2020-10-11 13:06:13
154.74.132.234 attackspam
1602362963 - 10/10/2020 22:49:23 Host: 154.74.132.234/154.74.132.234 Port: 445 TCP Blocked
2020-10-11 13:01:07
61.133.232.253 attackspam
Oct 11 04:16:21 minden010 sshd[13131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.253
Oct 11 04:16:22 minden010 sshd[13131]: Failed password for invalid user jeremy from 61.133.232.253 port 37228 ssh2
Oct 11 04:18:20 minden010 sshd[13772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.253
...
2020-10-11 12:57:57
106.12.215.238 attack
Oct 11 04:46:16 staging sshd[296353]: Invalid user prueba1 from 106.12.215.238 port 34512
Oct 11 04:46:16 staging sshd[296353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.215.238 
Oct 11 04:46:16 staging sshd[296353]: Invalid user prueba1 from 106.12.215.238 port 34512
Oct 11 04:46:18 staging sshd[296353]: Failed password for invalid user prueba1 from 106.12.215.238 port 34512 ssh2
...
2020-10-11 13:30:25
176.111.173.12 attackbotsspam
Oct 10 23:37:52 web01.agentur-b-2.de postfix/smtpd[549438]: warning: unknown[176.111.173.12]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 10 23:37:52 web01.agentur-b-2.de postfix/smtpd[549438]: lost connection after AUTH from unknown[176.111.173.12]
Oct 10 23:39:01 web01.agentur-b-2.de postfix/smtpd[549172]: warning: unknown[176.111.173.12]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 10 23:39:01 web01.agentur-b-2.de postfix/smtpd[549172]: lost connection after AUTH from unknown[176.111.173.12]
Oct 10 23:45:12 web01.agentur-b-2.de postfix/smtpd[549438]: warning: unknown[176.111.173.12]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-10-11 13:19:31

Recently Reported IPs

51.44.143.128 45.6.12.123 238.157.77.81 41.120.184.21
4.16.129.34 41.159.68.62 32.246.45.157 27.90.42.76
247.204.74.177 250.153.20.52 247.21.154.89 246.203.207.149
244.231.119.84 248.114.192.90 237.114.193.60 236.155.221.105
233.70.39.198 221.251.182.76 217.9.74.238 217.35.153.217