Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.145.79.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46068
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;50.145.79.149.			IN	A

;; AUTHORITY SECTION:
.			350	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110100 1800 900 604800 86400

;; Query time: 364 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 01 21:50:20 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 149.79.145.50.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.79.145.50.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
87.90.117.0 attackspambots
26.07.2019 09:05:05 SSH access blocked by firewall
2019-07-26 19:26:12
119.80.184.98 attackspambots
2019-07-26T11:44:32.835577abusebot-5.cloudsearch.cf sshd\[17377\]: Invalid user deploy from 119.80.184.98 port 58511
2019-07-26 19:55:58
187.65.240.24 attackbots
Jul 26 06:48:14 vps200512 sshd\[21758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.65.240.24  user=root
Jul 26 06:48:16 vps200512 sshd\[21758\]: Failed password for root from 187.65.240.24 port 30302 ssh2
Jul 26 06:54:16 vps200512 sshd\[21941\]: Invalid user rabbitmq from 187.65.240.24
Jul 26 06:54:16 vps200512 sshd\[21941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.65.240.24
Jul 26 06:54:18 vps200512 sshd\[21941\]: Failed password for invalid user rabbitmq from 187.65.240.24 port 15597 ssh2
2019-07-26 19:18:39
77.42.124.15 attackbotsspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-26 19:44:30
66.70.130.145 attack
26.07.2019 11:30:35 SSH access blocked by firewall
2019-07-26 19:38:38
144.202.41.83 attack
Jul 26 10:36:01 ovpn sshd\[10046\]: Invalid user ra from 144.202.41.83
Jul 26 10:36:01 ovpn sshd\[10046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.202.41.83
Jul 26 10:36:03 ovpn sshd\[10046\]: Failed password for invalid user ra from 144.202.41.83 port 58446 ssh2
Jul 26 11:04:57 ovpn sshd\[15359\]: Invalid user oracle from 144.202.41.83
Jul 26 11:04:57 ovpn sshd\[15359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.202.41.83
2019-07-26 19:33:03
192.162.237.36 attack
Jul 26 13:13:41 icinga sshd[29080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.162.237.36
Jul 26 13:13:43 icinga sshd[29080]: Failed password for invalid user ubuntu from 192.162.237.36 port 49318 ssh2
...
2019-07-26 19:30:24
106.12.16.166 attack
Jul 26 14:14:18 server sshd\[28708\]: Invalid user appserver from 106.12.16.166 port 54578
Jul 26 14:14:18 server sshd\[28708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.166
Jul 26 14:14:21 server sshd\[28708\]: Failed password for invalid user appserver from 106.12.16.166 port 54578 ssh2
Jul 26 14:18:10 server sshd\[27718\]: Invalid user admin from 106.12.16.166 port 60280
Jul 26 14:18:10 server sshd\[27718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.166
2019-07-26 19:55:07
110.138.149.64 attackspam
Jul 26 05:04:52 localhost kernel: [15376085.763519] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=110.138.149.64 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=30448 DF PROTO=TCP SPT=36484 DPT=8291 WINDOW=8192 RES=0x00 SYN URGP=0 
Jul 26 05:04:52 localhost kernel: [15376085.763548] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=110.138.149.64 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=30448 DF PROTO=TCP SPT=36484 DPT=8291 SEQ=3730170656 ACK=0 WINDOW=8192 RES=0x00 SYN URGP=0 OPT (020405840103030201010402) 
Jul 26 05:05:04 localhost kernel: [15376097.645252] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=110.138.149.64 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=25118 DF PROTO=TCP SPT=29298 DPT=8728 WINDOW=8192 RES=0x00 SYN URGP=0 
Jul 26 05:05:04 localhost kernel: [15376097.645283] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=110
2019-07-26 19:25:42
14.116.54.6 attackbotsspam
Jul 26 13:12:09 SilenceServices sshd[2874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.54.6
Jul 26 13:12:11 SilenceServices sshd[2874]: Failed password for invalid user user from 14.116.54.6 port 48982 ssh2
Jul 26 13:18:18 SilenceServices sshd[8064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.54.6
2019-07-26 19:21:12
153.36.236.242 attackspambots
2019-07-26T13:34:18.235444lon01.zurich-datacenter.net sshd\[9608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.242  user=root
2019-07-26T13:34:19.578787lon01.zurich-datacenter.net sshd\[9608\]: Failed password for root from 153.36.236.242 port 37482 ssh2
2019-07-26T13:34:21.712479lon01.zurich-datacenter.net sshd\[9608\]: Failed password for root from 153.36.236.242 port 37482 ssh2
2019-07-26T13:34:24.257628lon01.zurich-datacenter.net sshd\[9608\]: Failed password for root from 153.36.236.242 port 37482 ssh2
2019-07-26T13:34:28.516887lon01.zurich-datacenter.net sshd\[9611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.242  user=root
...
2019-07-26 19:43:54
185.176.27.30 attackspam
Splunk® : port scan detected:
Jul 26 07:23:35 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:64:c3:d6:0b:ef:f0:08:00 SRC=185.176.27.30 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=38669 PROTO=TCP SPT=57639 DPT=22893 WINDOW=1024 RES=0x00 SYN URGP=0
2019-07-26 19:36:44
180.247.43.43 attackbotsspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-26 19:38:58
98.254.2.222 attackbotsspam
Honeypot attack, port: 23, PTR: c-98-254-2-222.hsd1.fl.comcast.net.
2019-07-26 19:29:46
131.100.67.36 attack
Automatic report - Port Scan Attack
2019-07-26 20:08:51

Recently Reported IPs

31.162.220.231 16.136.110.242 255.117.83.252 185.80.54.26
149.71.209.117 152.33.188.171 74.69.62.125 39.233.150.175
123.217.121.87 196.36.37.54 177.113.147.71 32.167.255.225
61.95.222.128 151.225.250.211 31.206.1.85 148.227.231.248
241.201.152.1 96.116.204.212 184.113.8.3 162.41.45.98