Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.145.99.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57155
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.145.99.190.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022600 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 17:52:33 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 190.99.145.50.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 190.99.145.50.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
174.138.54.109 attackbots
Wordpress Attacks [Scanning for wp-login.php] @ 2019-11-17 12:12:18
2019-11-17 20:14:08
222.186.173.238 attack
Nov 17 12:52:53 ovpn sshd\[4169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238  user=root
Nov 17 12:52:55 ovpn sshd\[4169\]: Failed password for root from 222.186.173.238 port 52580 ssh2
Nov 17 12:52:58 ovpn sshd\[4169\]: Failed password for root from 222.186.173.238 port 52580 ssh2
Nov 17 12:53:01 ovpn sshd\[4169\]: Failed password for root from 222.186.173.238 port 52580 ssh2
Nov 17 12:53:04 ovpn sshd\[4169\]: Failed password for root from 222.186.173.238 port 52580 ssh2
2019-11-17 19:58:17
54.38.241.215 attack
SSH Bruteforce
2019-11-17 20:36:34
60.12.26.9 attackbotsspam
Nov 17 12:34:10 ncomp sshd[32735]: Invalid user ftpuser from 60.12.26.9
Nov 17 12:34:10 ncomp sshd[32735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.12.26.9
Nov 17 12:34:10 ncomp sshd[32735]: Invalid user ftpuser from 60.12.26.9
Nov 17 12:34:12 ncomp sshd[32735]: Failed password for invalid user ftpuser from 60.12.26.9 port 33335 ssh2
2019-11-17 20:29:37
81.241.235.191 attackbots
Nov 17 11:52:00 mail sshd[17165]: Failed password for root from 81.241.235.191 port 35202 ssh2
Nov 17 11:55:09 mail sshd[17748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.241.235.191 
Nov 17 11:55:11 mail sshd[17748]: Failed password for invalid user ehs from 81.241.235.191 port 42486 ssh2
2019-11-17 19:59:54
80.211.171.78 attackbotsspam
SSH Bruteforce
2019-11-17 20:05:43
153.37.22.155 attackbotsspam
'IP reached maximum auth failures for a one day block'
2019-11-17 20:03:14
68.183.180.129 attackbotsspam
SSH Bruteforce
2019-11-17 20:14:33
81.136.255.20 attackbots
SSH Bruteforce
2019-11-17 20:01:35
128.199.216.250 attack
Nov 17 09:59:09 sd-53420 sshd\[29534\]: Invalid user ms from 128.199.216.250
Nov 17 09:59:09 sd-53420 sshd\[29534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.216.250
Nov 17 09:59:10 sd-53420 sshd\[29534\]: Failed password for invalid user ms from 128.199.216.250 port 54525 ssh2
Nov 17 10:03:14 sd-53420 sshd\[30715\]: Invalid user renee from 128.199.216.250
Nov 17 10:03:14 sd-53420 sshd\[30715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.216.250
...
2019-11-17 20:09:19
66.143.231.89 attackspam
SSH Bruteforce
2019-11-17 20:18:57
58.142.8.85 attack
Nov 17 14:36:48 server sshd\[21540\]: Invalid user usuario from 58.142.8.85
Nov 17 14:36:48 server sshd\[21540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.142.8.85 
Nov 17 14:36:50 server sshd\[21540\]: Failed password for invalid user usuario from 58.142.8.85 port 35979 ssh2
Nov 17 14:36:52 server sshd\[21540\]: Failed password for invalid user usuario from 58.142.8.85 port 35979 ssh2
Nov 17 14:36:55 server sshd\[21540\]: Failed password for invalid user usuario from 58.142.8.85 port 35979 ssh2
...
2019-11-17 20:34:18
27.191.209.93 attack
2019-11-17T12:32:57.327450abusebot-4.cloudsearch.cf sshd\[16128\]: Invalid user sheelagh from 27.191.209.93 port 43376
2019-11-17 20:39:13
103.207.39.197 attack
Nov 17 13:22:05 lcl-usvr-02 sshd[8554]: Invalid user admin from 103.207.39.197 port 51499
...
2019-11-17 20:26:26
51.77.211.94 attackbotsspam
Nov 17 13:59:20 server2 sshd\[18303\]: Invalid user nanjing from 51.77.211.94
Nov 17 13:59:57 server2 sshd\[18334\]: Invalid user nanjing from 51.77.211.94
Nov 17 14:00:01 server2 sshd\[18338\]: Invalid user nanjing from 51.77.211.94
Nov 17 14:01:52 server2 sshd\[18619\]: Invalid user nanjing from 51.77.211.94
Nov 17 14:02:09 server2 sshd\[18650\]: Invalid user nanjing from 51.77.211.94
Nov 17 14:03:03 server2 sshd\[18692\]: Invalid user nanjing from 51.77.211.94
2019-11-17 20:22:39

Recently Reported IPs

218.248.232.76 77.205.160.113 195.5.243.22 34.250.202.151
223.37.252.70 131.145.87.253 236.182.214.8 99.243.48.207
133.187.212.41 45.195.8.43 56.75.140.137 2.125.85.2
150.159.135.2 113.96.84.95 252.117.226.213 6.165.22.177
172.65.252.114 6.98.247.20 68.193.131.195 116.130.3.84