Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.85.50.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51085
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.85.50.112.			IN	A

;; AUTHORITY SECTION:
.			158	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061401 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 15 11:38:57 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 112.50.85.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 112.50.85.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
1.20.237.152 attackspambots
Automatic report - Port Scan Attack
2019-11-04 16:51:43
117.48.208.71 attack
Nov  3 22:24:55 hanapaa sshd\[849\]: Invalid user sercon from 117.48.208.71
Nov  3 22:24:55 hanapaa sshd\[849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.208.71
Nov  3 22:24:57 hanapaa sshd\[849\]: Failed password for invalid user sercon from 117.48.208.71 port 52118 ssh2
Nov  3 22:29:53 hanapaa sshd\[1214\]: Invalid user denny from 117.48.208.71
Nov  3 22:29:53 hanapaa sshd\[1214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.208.71
2019-11-04 16:48:20
180.101.125.76 attack
Nov  4 10:01:24 dedicated sshd[15752]: Invalid user arma3life from 180.101.125.76 port 55140
2019-11-04 17:14:53
157.230.235.233 attackspam
2019-11-04T06:28:29.737502abusebot-4.cloudsearch.cf sshd\[22699\]: Invalid user tani from 157.230.235.233 port 35016
2019-11-04 17:10:43
116.255.159.177 attackspambots
Nov  4 03:28:09 ny01 sshd[16858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.255.159.177
Nov  4 03:28:10 ny01 sshd[16858]: Failed password for invalid user user from 116.255.159.177 port 34510 ssh2
Nov  4 03:33:16 ny01 sshd[17315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.255.159.177
2019-11-04 17:06:59
185.88.196.30 attackspambots
2019-11-04T09:05:52.429471abusebot-5.cloudsearch.cf sshd\[13522\]: Invalid user test from 185.88.196.30 port 42835
2019-11-04 17:13:27
118.41.11.46 attackbotsspam
SSH bruteforce (Triggered fail2ban)
2019-11-04 16:57:56
185.232.67.6 attack
Nov  4 09:24:17 dedicated sshd[9962]: Invalid user admin from 185.232.67.6 port 33451
2019-11-04 16:58:49
80.211.67.17 attackbots
2019-11-04T09:13:43.816523host3.slimhost.com.ua sshd[1173470]: Invalid user justin from 80.211.67.17 port 35986
2019-11-04T09:13:43.820430host3.slimhost.com.ua sshd[1173470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.67.17
2019-11-04T09:13:43.816523host3.slimhost.com.ua sshd[1173470]: Invalid user justin from 80.211.67.17 port 35986
2019-11-04T09:13:45.706169host3.slimhost.com.ua sshd[1173470]: Failed password for invalid user justin from 80.211.67.17 port 35986 ssh2
2019-11-04T09:17:27.633877host3.slimhost.com.ua sshd[1177016]: Invalid user btj from 80.211.67.17 port 44728
...
2019-11-04 17:04:09
92.63.194.47 attackbots
Automatic report - Banned IP Access
2019-11-04 17:06:27
119.196.213.20 attackbots
Fail2Ban - FTP Abuse Attempt
2019-11-04 17:07:55
187.141.35.197 spam
Return-Path: 
2019-11-04 17:11:12
81.133.171.53 attack
Unauthorised access (Nov  4) SRC=81.133.171.53 LEN=52 TTL=111 ID=22401 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-04 16:41:07
54.36.168.119 attackspam
Nov  4 08:45:02 dedicated sshd[3952]: Failed password for invalid user aaron from 54.36.168.119 port 38238 ssh2
Nov  4 08:44:59 dedicated sshd[3952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.168.119 
Nov  4 08:44:59 dedicated sshd[3952]: Invalid user aaron from 54.36.168.119 port 38238
Nov  4 08:45:02 dedicated sshd[3952]: Failed password for invalid user aaron from 54.36.168.119 port 38238 ssh2
Nov  4 08:45:04 dedicated sshd[3984]: Invalid user ab from 54.36.168.119 port 39570
2019-11-04 17:14:28
81.133.73.161 attackbotsspam
5x Failed Password
2019-11-04 17:01:31

Recently Reported IPs

49.85.51.66 49.85.50.100 49.85.51.22 49.85.51.166
49.82.22.251 49.82.136.157 49.81.125.15 49.82.26.78
49.82.140.170 5.202.149.90 5.202.159.34 2.39.222.153
2.39.235.74 2.39.254.157 2.42.68.92 109.108.87.154
88.247.21.45 188.4.20.214 2.39.196.32 2.39.245.14