Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.148.205.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20024
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.148.205.113.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 18:47:04 CST 2025
;; MSG SIZE  rcvd: 107
Host info
113.205.148.50.in-addr.arpa domain name pointer eg-1-1-3-3994-soag15.malvern.pa.panjde.comcast.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
113.205.148.50.in-addr.arpa	name = eg-1-1-3-3994-soag15.malvern.pa.panjde.comcast.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
46.209.216.233 attack
Jun 21 22:03:40 localhost sshd\[5264\]: Invalid user hu from 46.209.216.233 port 35724
Jun 21 22:03:40 localhost sshd\[5264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.209.216.233
Jun 21 22:03:42 localhost sshd\[5264\]: Failed password for invalid user hu from 46.209.216.233 port 35724 ssh2
2019-06-22 06:49:01
69.25.27.115 attackspam
2019/06/21 12:42:11 -- [DOS][Block][trace_route][69.25.27.115->181.29.101.11][ICMP][HLen=20, TLen=44, Type=8, Code=0]
2019/06/21 12:42:13 -- [DOS][Block][trace_route][69.25.27.110->181.29.101.11][ICMP][HLen=20, TLen=44, Type=8, Code=0]
2019-06-22 06:50:43
218.92.0.141 attackspambots
Jun 21 21:43:04 cp sshd[10724]: Failed password for root from 218.92.0.141 port 26171 ssh2
Jun 21 21:43:06 cp sshd[10724]: Failed password for root from 218.92.0.141 port 26171 ssh2
Jun 21 21:43:09 cp sshd[10724]: Failed password for root from 218.92.0.141 port 26171 ssh2
Jun 21 21:43:12 cp sshd[10724]: Failed password for root from 218.92.0.141 port 26171 ssh2
2019-06-22 06:57:36
193.32.163.182 attackspambots
Jun 22 00:48:13 MK-Soft-Root2 sshd\[27302\]: Invalid user admin from 193.32.163.182 port 39004
Jun 22 00:48:13 MK-Soft-Root2 sshd\[27302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.163.182
Jun 22 00:48:16 MK-Soft-Root2 sshd\[27302\]: Failed password for invalid user admin from 193.32.163.182 port 39004 ssh2
...
2019-06-22 06:55:02
65.255.208.99 attackbotsspam
23/tcp
[2019-06-21]1pkt
2019-06-22 06:56:10
5.77.215.146 attackbots
445/tcp 445/tcp
[2019-06-21]2pkt
2019-06-22 06:43:57
31.173.4.92 attackbots
8080/tcp
[2019-06-21]1pkt
2019-06-22 07:22:40
78.165.92.76 attackspam
Request: "GET / HTTP/1.1"
2019-06-22 07:03:15
177.9.212.52 attack
Request: "GET / HTTP/1.1"
2019-06-22 06:46:49
111.204.157.197 attack
Jun 21 23:42:03 mail sshd\[11991\]: Failed password for invalid user developer from 111.204.157.197 port 57547 ssh2
Jun 21 23:57:56 mail sshd\[12077\]: Invalid user user2 from 111.204.157.197 port 44085
Jun 21 23:57:56 mail sshd\[12077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.204.157.197
...
2019-06-22 07:18:57
94.191.99.114 attack
Invalid user rute from 94.191.99.114 port 39438
2019-06-22 07:08:27
42.116.163.109 attackspam
445/tcp
[2019-06-21]1pkt
2019-06-22 07:05:51
200.250.25.213 attackspam
Automatic report - SSH Brute-Force Attack
2019-06-22 06:42:00
89.205.5.98 attack
Request: "GET / HTTP/1.1"
2019-06-22 06:55:18
164.160.5.194 attack
Request: "GET / HTTP/1.1"
2019-06-22 06:52:10

Recently Reported IPs

212.193.250.1 144.89.179.146 160.77.113.157 106.247.106.239
93.67.182.190 227.103.105.244 173.54.180.145 243.211.223.157
241.174.30.56 79.102.153.122 7.169.81.210 51.10.93.200
153.39.51.50 164.110.30.105 44.20.147.122 107.236.167.178
197.28.100.104 134.196.136.89 211.2.136.168 4.252.173.149