Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Christchurch

Region: Canterbury

Country: New Zealand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.50.229.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31438
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.50.229.63.			IN	A

;; AUTHORITY SECTION:
.			195	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022121800 1800 900 604800 86400

;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 18 21:43:19 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 63.229.50.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 63.229.50.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
223.241.247.214 attackspambots
Fail2Ban Ban Triggered
2020-02-20 20:17:46
99.183.144.132 attackbotsspam
Feb 20 17:15:02 gw1 sshd[6623]: Failed password for daemon from 99.183.144.132 port 36716 ssh2
...
2020-02-20 20:43:54
69.160.2.184 attackspambots
Unauthorized connection attempt from IP address 69.160.2.184 on Port 445(SMB)
2020-02-20 20:53:15
210.2.145.90 attackspambots
Honeypot attack, port: 445, PTR: static-host210-2-145-90.link.net.pk.
2020-02-20 20:45:15
157.230.247.240 attack
SSH invalid-user multiple login try
2020-02-20 20:20:29
222.186.180.9 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
Failed password for root from 222.186.180.9 port 45582 ssh2
Failed password for root from 222.186.180.9 port 45582 ssh2
Failed password for root from 222.186.180.9 port 45582 ssh2
Failed password for root from 222.186.180.9 port 45582 ssh2
2020-02-20 20:16:51
61.216.35.96 attack
Honeypot attack, port: 445, PTR: 61-216-35-96.HINET-IP.hinet.net.
2020-02-20 20:22:36
118.200.27.63 attackbotsspam
Hits on port : 5500
2020-02-20 20:37:18
201.247.246.18 attack
20/2/19@23:49:07: FAIL: Alarm-Network address from=201.247.246.18
20/2/19@23:49:07: FAIL: Alarm-Network address from=201.247.246.18
...
2020-02-20 20:31:51
104.250.108.83 attackbots
Hits on port : 22
2020-02-20 20:39:00
82.64.9.197 attackspambots
Feb 20 08:29:39 cp sshd[11139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.9.197
2020-02-20 20:35:33
162.243.133.88 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-20 20:36:46
116.86.180.206 attackbots
Honeypot attack, port: 81, PTR: 206.180.86.116.starhub.net.sg.
2020-02-20 20:54:15
122.179.4.234 attack
Honeypot attack, port: 445, PTR: abts-kk-dynamic-234.4.179.122.airtelbroadband.in.
2020-02-20 20:17:22
182.184.44.6 attack
Invalid user default from 182.184.44.6 port 38934
2020-02-20 20:53:41

Recently Reported IPs

206.189.161.255 202.165.25.27 61.177.173.46 202.152.60.233
159.203.182.218 66.151.199.247 65.108.213.31 157.230.96.51
5.24.142.86 229.47.183.148 195.201.225.227 193.19.97.160
190.104.25.221 34.238.157.10 26.140.137.10 197.248.63.75
158.69.80.165 134.159.34.28 122.117.16.28 141.95.55.182