Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.243.166.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19204
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.243.166.49.			IN	A

;; AUTHORITY SECTION:
.			373	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023032900 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 29 17:46:02 CST 2023
;; MSG SIZE  rcvd: 106
Host info
49.166.243.50.in-addr.arpa domain name pointer 50-243-166-49-static.hfc.comcastbusiness.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.166.243.50.in-addr.arpa	name = 50-243-166-49-static.hfc.comcastbusiness.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
192.144.185.74 attackbots
Jun 10 23:15:29 gestao sshd[19950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.185.74 
Jun 10 23:15:31 gestao sshd[19950]: Failed password for invalid user sitadmin from 192.144.185.74 port 39106 ssh2
Jun 10 23:17:06 gestao sshd[20005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.185.74 
...
2020-06-11 07:08:56
162.243.139.153 attackbots
 TCP (SYN) 162.243.139.153:51124 -> port 587, len 44
2020-06-11 06:56:52
89.43.78.171 attackbotsspam
Tried our host z.
2020-06-11 07:13:40
14.63.162.98 attackspambots
2020-06-10T19:18:55.724036shield sshd\[23896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.162.98  user=root
2020-06-10T19:18:57.632860shield sshd\[23896\]: Failed password for root from 14.63.162.98 port 59897 ssh2
2020-06-10T19:21:22.606188shield sshd\[24867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.162.98  user=root
2020-06-10T19:21:25.018958shield sshd\[24867\]: Failed password for root from 14.63.162.98 port 50006 ssh2
2020-06-10T19:23:45.574333shield sshd\[26017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.162.98  user=root
2020-06-11 06:48:40
43.245.219.130 attack
SSH Brute-Force Attack
2020-06-11 07:23:00
101.78.149.142 attackbotsspam
SSH Invalid Login
2020-06-11 06:53:30
180.180.241.93 attack
Jun 10 23:49:53 fhem-rasp sshd[15079]: Invalid user zein from 180.180.241.93 port 48294
...
2020-06-11 07:05:36
157.245.10.196 attack
firewall-block, port(s): 16600/tcp
2020-06-11 07:10:33
210.245.110.9 attackspam
2020-06-11T00:35:40.575766mail.broermann.family sshd[32311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.110.9
2020-06-11T00:35:40.569726mail.broermann.family sshd[32311]: Invalid user admin from 210.245.110.9 port 46611
2020-06-11T00:35:42.765895mail.broermann.family sshd[32311]: Failed password for invalid user admin from 210.245.110.9 port 46611 ssh2
2020-06-11T00:43:34.408476mail.broermann.family sshd[507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.110.9  user=root
2020-06-11T00:43:36.669215mail.broermann.family sshd[507]: Failed password for root from 210.245.110.9 port 49467 ssh2
...
2020-06-11 06:49:38
188.165.210.176 attackbots
Invalid user admin from 188.165.210.176 port 58071
2020-06-11 07:06:40
175.6.102.248 attack
2020-06-10T21:01:13.891904shield sshd\[18604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.102.248  user=root
2020-06-10T21:01:16.102505shield sshd\[18604\]: Failed password for root from 175.6.102.248 port 46780 ssh2
2020-06-10T21:04:31.977508shield sshd\[18997\]: Invalid user jodelle from 175.6.102.248 port 40830
2020-06-10T21:04:31.981137shield sshd\[18997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.102.248
2020-06-10T21:04:33.705165shield sshd\[18997\]: Failed password for invalid user jodelle from 175.6.102.248 port 40830 ssh2
2020-06-11 07:14:08
106.13.181.242 attackbots
Jun 10 21:23:58 ns392434 sshd[11433]: Invalid user teamspeak3-server from 106.13.181.242 port 42292
Jun 10 21:23:58 ns392434 sshd[11433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.181.242
Jun 10 21:23:58 ns392434 sshd[11433]: Invalid user teamspeak3-server from 106.13.181.242 port 42292
Jun 10 21:23:59 ns392434 sshd[11433]: Failed password for invalid user teamspeak3-server from 106.13.181.242 port 42292 ssh2
Jun 10 21:39:42 ns392434 sshd[11802]: Invalid user user from 106.13.181.242 port 55960
Jun 10 21:39:42 ns392434 sshd[11802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.181.242
Jun 10 21:39:42 ns392434 sshd[11802]: Invalid user user from 106.13.181.242 port 55960
Jun 10 21:39:44 ns392434 sshd[11802]: Failed password for invalid user user from 106.13.181.242 port 55960 ssh2
Jun 10 21:46:21 ns392434 sshd[12039]: Invalid user davenportdesignsd from 106.13.181.242 port 55224
2020-06-11 06:59:44
139.155.74.147 attackbotsspam
Jun 11 01:32:45 dhoomketu sshd[634888]: Failed password for invalid user mass from 139.155.74.147 port 58408 ssh2
Jun 11 01:34:46 dhoomketu sshd[634960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.74.147  user=root
Jun 11 01:34:47 dhoomketu sshd[634960]: Failed password for root from 139.155.74.147 port 42767 ssh2
Jun 11 01:36:48 dhoomketu sshd[634989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.74.147  user=root
Jun 11 01:36:50 dhoomketu sshd[634989]: Failed password for root from 139.155.74.147 port 55354 ssh2
...
2020-06-11 06:57:17
85.143.216.214 attack
Jun 10 21:30:45: Invalid user am from 85.143.216.214 port 43036
2020-06-11 07:21:38
117.120.7.174 attack
Automatic report - XMLRPC Attack
2020-06-11 06:55:26

Recently Reported IPs

168.218.241.169 88.87.143.106 56.162.13.47 74.119.186.228
61.233.83.165 50.238.178.112 167.62.125.102 164.182.162.78
201.149.37.137 193.96.232.254 206.208.64.125 231.239.229.234
181.245.210.163 104.105.65.160 93.139.127.118 244.97.10.110
192.202.75.196 101.199.252.249 74.247.200.54 242.77.14.47