Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Comcast Cable Communications, LLC

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.148.156.223
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34733
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;50.148.156.223.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051700 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat May 18 00:41:35 CST 2019
;; MSG SIZE  rcvd: 118

Host info
223.156.148.50.in-addr.arpa domain name pointer c-50-148-156-223.hsd1.ca.comcast.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
223.156.148.50.in-addr.arpa	name = c-50-148-156-223.hsd1.ca.comcast.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
150.217.34.174 attack
2019-07-05T20:48:39.057048cavecanem sshd[15014]: Invalid user ot from 150.217.34.174 port 50490
2019-07-05T20:48:39.061577cavecanem sshd[15014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.217.34.174
2019-07-05T20:48:39.057048cavecanem sshd[15014]: Invalid user ot from 150.217.34.174 port 50490
2019-07-05T20:48:40.940076cavecanem sshd[15014]: Failed password for invalid user ot from 150.217.34.174 port 50490 ssh2
2019-07-05T20:50:57.385167cavecanem sshd[15688]: Invalid user krishna from 150.217.34.174 port 34848
2019-07-05T20:50:57.387543cavecanem sshd[15688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.217.34.174
2019-07-05T20:50:57.385167cavecanem sshd[15688]: Invalid user krishna from 150.217.34.174 port 34848
2019-07-05T20:50:59.878196cavecanem sshd[15688]: Failed password for invalid user krishna from 150.217.34.174 port 34848 ssh2
2019-07-05T20:53:14.185766cavecanem sshd[16283]: Invali
...
2019-07-06 04:54:42
139.99.40.27 attackbots
Jul  5 20:48:35 dedicated sshd[26860]: Invalid user classique from 139.99.40.27 port 52946
2019-07-06 04:28:54
85.10.33.171 attackspam
Jul  5 21:54:33 rpi sshd[9523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.10.33.171 
Jul  5 21:54:35 rpi sshd[9523]: Failed password for invalid user role1 from 85.10.33.171 port 55722 ssh2
2019-07-06 04:08:14
61.137.200.173 attackbots
TCP port 23 (Telnet) attempt blocked by firewall. [2019-07-05 20:06:45]
2019-07-06 04:16:31
159.192.202.232 attackbots
Automatic report - SSH Brute-Force Attack
2019-07-06 04:36:01
212.27.63.130 attack
DISCOVER CARD IDENTITY THEFT FRAUD ATTEMPT TO PAY BILL FROM XTRA.CO.NZ WITH TWO WEBSITES BY PROXAD.NET AND A REPLY TO ADDRESS FROM SYNACOR.COM
2019-07-06 04:25:00
94.232.32.91 attackbotsspam
NAME : mikemi-net CIDR : 94.232.32.0/21 DDoS attack Poland - block certain countries :) IP: 94.232.32.91  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-07-06 04:27:47
180.244.232.60 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-05 16:33:33,551 INFO [shellcode_manager] (180.244.232.60) no match, writing hexdump (458156cc2be0532c3f29e5f9ccf909c4 :2124055) - MS17010 (EternalBlue)
2019-07-06 04:37:37
190.198.36.46 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-05 16:14:18,497 INFO [shellcode_manager] (190.198.36.46) no match, writing hexdump (16d7fbc90c836de2c4be21d70ae524c2 :2053293) - MS17010 (EternalBlue)
2019-07-06 04:33:22
144.217.180.46 attackspambots
Honeypot attack, port: 445, PTR: ns540401.ip-144-217-180.net.
2019-07-06 04:21:04
160.153.234.236 attack
Jul  5 20:50:32 vpn01 sshd\[22407\]: Invalid user emil from 160.153.234.236
Jul  5 20:50:32 vpn01 sshd\[22407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.153.234.236
Jul  5 20:50:34 vpn01 sshd\[22407\]: Failed password for invalid user emil from 160.153.234.236 port 48182 ssh2
2019-07-06 04:45:21
185.69.145.149 attackspambots
Jul  5 19:44:51 shared07 sshd[3551]: Invalid user ts3 from 185.69.145.149
Jul  5 19:44:51 shared07 sshd[3551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.69.145.149
Jul  5 19:44:53 shared07 sshd[3551]: Failed password for invalid user ts3 from 185.69.145.149 port 56472 ssh2
Jul  5 19:44:53 shared07 sshd[3551]: Received disconnect from 185.69.145.149 port 56472:11: Bye Bye [preauth]
Jul  5 19:44:53 shared07 sshd[3551]: Disconnected from 185.69.145.149 port 56472 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=185.69.145.149
2019-07-06 04:52:09
207.154.239.128 attackbotsspam
Jul  5 20:07:40 www sshd\[10108\]: Invalid user pq from 207.154.239.128 port 42484
...
2019-07-06 04:10:29
85.11.48.222 attackspam
Honeypot attack, port: 23, PTR: ip222.selangerhus1.kund.riksnet.se.
2019-07-06 04:14:33
109.165.235.101 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-07-06 04:16:09

Recently Reported IPs

192.195.203.140 196.146.244.201 146.9.171.19 185.53.88.209
216.94.173.204 77.182.140.145 104.3.69.65 208.136.102.216
52.119.212.81 4.81.179.206 35.104.223.128 166.233.55.191
159.138.54.168 202.65.206.129 103.108.18.99 250.234.150.175
202.194.7.5 206.25.156.77 97.218.32.19 110.11.173.74