Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.148.83.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59200
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.148.83.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 435 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 22:15:17 CST 2025
;; MSG SIZE  rcvd: 105
Host info
21.83.148.50.in-addr.arpa domain name pointer c-50-148-83-21.hsd1.in.comcast.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.83.148.50.in-addr.arpa	name = c-50-148-83-21.hsd1.in.comcast.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
58.219.247.218 attack
Aug  9 20:09:41 linode sshd[28922]: Invalid user pi from 58.219.247.218 port 37662
Aug  9 20:09:41 linode sshd[28924]: Invalid user pi from 58.219.247.218 port 37741
...
2020-08-10 00:55:58
37.192.43.158 attackspam
1596974990 - 08/09/2020 14:09:50 Host: 37.192.43.158/37.192.43.158 Port: 445 TCP Blocked
2020-08-10 00:59:14
106.54.139.117 attackbots
Aug  9 18:49:59 Ubuntu-1404-trusty-64-minimal sshd\[1341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.139.117  user=root
Aug  9 18:50:01 Ubuntu-1404-trusty-64-minimal sshd\[1341\]: Failed password for root from 106.54.139.117 port 56682 ssh2
Aug  9 18:58:31 Ubuntu-1404-trusty-64-minimal sshd\[7512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.139.117  user=root
Aug  9 18:58:33 Ubuntu-1404-trusty-64-minimal sshd\[7512\]: Failed password for root from 106.54.139.117 port 56928 ssh2
Aug  9 19:04:17 Ubuntu-1404-trusty-64-minimal sshd\[13839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.139.117  user=root
2020-08-10 01:18:09
45.95.168.138 attack
 TCP (SYN) 45.95.168.138:36626 -> port 22, len 48
2020-08-10 01:05:17
212.64.3.40 attackbotsspam
SSH Brute Force
2020-08-10 00:56:20
176.31.255.223 attackspambots
SSH Brute Force
2020-08-10 01:23:45
218.88.84.35 attack
3389BruteforceStormFW21
2020-08-10 01:09:21
123.108.50.164 attackbots
SSH Brute Force
2020-08-10 01:32:09
129.211.86.49 attackbotsspam
Aug  9 03:05:05 web9 sshd\[27594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.86.49  user=root
Aug  9 03:05:07 web9 sshd\[27594\]: Failed password for root from 129.211.86.49 port 58608 ssh2
Aug  9 03:07:16 web9 sshd\[27965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.86.49  user=root
Aug  9 03:07:18 web9 sshd\[27965\]: Failed password for root from 129.211.86.49 port 51094 ssh2
Aug  9 03:09:20 web9 sshd\[28300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.86.49  user=root
2020-08-10 01:04:24
5.190.189.240 attackspambots
Aug  9 15:46:23 mail.srvfarm.net postfix/smtps/smtpd[837588]: warning: unknown[5.190.189.240]: SASL PLAIN authentication failed: 
Aug  9 15:46:24 mail.srvfarm.net postfix/smtps/smtpd[837588]: lost connection after AUTH from unknown[5.190.189.240]
Aug  9 15:52:10 mail.srvfarm.net postfix/smtpd[835598]: warning: unknown[5.190.189.240]: SASL PLAIN authentication failed: 
Aug  9 15:52:10 mail.srvfarm.net postfix/smtpd[835598]: lost connection after AUTH from unknown[5.190.189.240]
Aug  9 15:55:38 mail.srvfarm.net postfix/smtps/smtpd[837591]: warning: unknown[5.190.189.240]: SASL PLAIN authentication failed:
2020-08-10 01:28:17
149.56.107.216 attackspambots
Aug  9 18:43:52 ip106 sshd[19342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.107.216 
Aug  9 18:43:54 ip106 sshd[19342]: Failed password for invalid user saqib from 149.56.107.216 port 45192 ssh2
...
2020-08-10 01:08:24
87.246.7.140 attack
Aug  9 14:09:17 srv1 postfix/smtpd[6220]: warning: unknown[87.246.7.140]: SASL LOGIN authentication failed: authentication failure
Aug  9 14:09:32 srv1 postfix/smtpd[6220]: warning: unknown[87.246.7.140]: SASL LOGIN authentication failed: authentication failure
Aug  9 14:09:39 srv1 postfix/smtpd[6220]: warning: unknown[87.246.7.140]: SASL LOGIN authentication failed: authentication failure
Aug  9 14:09:46 srv1 postfix/smtpd[6220]: warning: unknown[87.246.7.140]: SASL LOGIN authentication failed: authentication failure
Aug  9 14:09:50 srv1 postfix/smtpd[6220]: warning: unknown[87.246.7.140]: SASL LOGIN authentication failed: authentication failure
...
2020-08-10 00:57:17
220.88.1.208 attackbotsspam
2020-08-09T19:04:45.699581hostname sshd[14988]: Failed password for root from 220.88.1.208 port 53905 ssh2
2020-08-09T19:09:07.611235hostname sshd[16617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.88.1.208  user=root
2020-08-09T19:09:09.518604hostname sshd[16617]: Failed password for root from 220.88.1.208 port 58414 ssh2
...
2020-08-10 01:27:02
152.136.156.14 attack
Aug  9 18:45:53 amit sshd\[14349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.156.14  user=root
Aug  9 18:45:56 amit sshd\[14349\]: Failed password for root from 152.136.156.14 port 35806 ssh2
Aug  9 18:53:53 amit sshd\[28260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.156.14  user=root
...
2020-08-10 01:25:12
64.227.86.50 attack
 TCP (SYN) 64.227.86.50:47784 -> port 1110, len 44
2020-08-10 01:35:50

Recently Reported IPs

85.54.53.150 35.55.53.78 236.209.163.211 147.108.130.114
187.250.207.169 134.225.110.81 140.180.191.107 169.152.170.60
145.246.71.127 198.111.22.85 66.240.96.165 210.201.147.122
90.72.92.20 229.172.213.248 249.253.163.109 248.231.149.125
167.6.6.52 27.136.108.226 247.70.171.235 124.35.222.2