Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.69.245.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61370
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.69.245.105.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022201 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 04:58:51 CST 2025
;; MSG SIZE  rcvd: 106
Host info
105.245.69.50.in-addr.arpa domain name pointer S0106c4509ca7094e.ca.shawcable.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
105.245.69.50.in-addr.arpa	name = S0106c4509ca7094e.ca.shawcable.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.231.225.162 attackspam
ssh intrusion attempt
2020-03-25 21:08:38
14.116.188.75 attackspam
Mar 25 14:26:48 mout sshd[5368]: Invalid user test from 14.116.188.75 port 58989
2020-03-25 21:28:32
138.0.115.52 attackspam
" "
2020-03-25 21:19:49
77.55.210.81 attackspam
Mar 25 06:29:40 home sshd[14909]: Invalid user wilmore from 77.55.210.81 port 48610
Mar 25 06:29:40 home sshd[14909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.55.210.81
Mar 25 06:29:40 home sshd[14909]: Invalid user wilmore from 77.55.210.81 port 48610
Mar 25 06:29:42 home sshd[14909]: Failed password for invalid user wilmore from 77.55.210.81 port 48610 ssh2
Mar 25 06:39:39 home sshd[15075]: Invalid user test from 77.55.210.81 port 52930
Mar 25 06:39:39 home sshd[15075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.55.210.81
Mar 25 06:39:39 home sshd[15075]: Invalid user test from 77.55.210.81 port 52930
Mar 25 06:39:41 home sshd[15075]: Failed password for invalid user test from 77.55.210.81 port 52930 ssh2
Mar 25 06:43:29 home sshd[15151]: Invalid user yn from 77.55.210.81 port 40606
Mar 25 06:43:29 home sshd[15151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.55.21
2020-03-25 21:22:39
46.229.168.163 attack
Automatic report - Banned IP Access
2020-03-25 21:36:07
47.50.246.114 attack
Mar 25 13:50:58 mailserver sshd\[25137\]: Invalid user serazetdinov from 47.50.246.114
...
2020-03-25 21:17:52
182.35.110.214 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-25 21:39:41
167.99.162.102 attack
$f2bV_matches
2020-03-25 21:12:54
180.175.81.204 attack
(Mar 25)  LEN=40 TTL=52 ID=12594 TCP DPT=8080 WINDOW=18505 SYN 
 (Mar 25)  LEN=40 TTL=52 ID=29522 TCP DPT=8080 WINDOW=41648 SYN 
 (Mar 25)  LEN=40 TTL=52 ID=55262 TCP DPT=8080 WINDOW=41648 SYN 
 (Mar 25)  LEN=40 TTL=52 ID=57500 TCP DPT=8080 WINDOW=13905 SYN 
 (Mar 25)  LEN=40 TTL=52 ID=28576 TCP DPT=8080 WINDOW=4640 SYN 
 (Mar 24)  LEN=40 TTL=52 ID=49386 TCP DPT=8080 WINDOW=8459 SYN 
 (Mar 24)  LEN=40 TTL=52 ID=24028 TCP DPT=8080 WINDOW=41648 SYN 
 (Mar 24)  LEN=40 TTL=52 ID=12432 TCP DPT=8080 WINDOW=25580 SYN 
 (Mar 23)  LEN=40 TTL=52 ID=22862 TCP DPT=8080 WINDOW=64580 SYN 
 (Mar 23)  LEN=40 TTL=52 ID=34604 TCP DPT=8080 WINDOW=18505 SYN 
 (Mar 23)  LEN=40 TTL=52 ID=3774 TCP DPT=8080 WINDOW=4622 SYN 
 (Mar 23)  LEN=40 TTL=52 ID=28667 TCP DPT=8080 WINDOW=41648 SYN 
 (Mar 23)  LEN=40 TTL=52 ID=63222 TCP DPT=8080 WINDOW=4622 SYN 
 (Mar 22)  LEN=40 TTL=52 ID=54851 TCP DPT=8080 WINDOW=8459 SYN 
 (Mar 22)  LEN=40 TTL=52 ID=64235 TCP DPT=8080 WINDOW=41648 SYN 
 (Mar 22)  LEN=40 TTL=52 ID=156...
2020-03-25 21:14:06
46.229.168.153 attackbotsspam
Automatic report - Banned IP Access
2020-03-25 21:34:46
65.31.127.80 attackspam
Invalid user testing from 65.31.127.80 port 34948
2020-03-25 21:31:49
45.14.148.95 attackbotsspam
Invalid user cabel from 45.14.148.95 port 34272
2020-03-25 21:19:22
207.154.234.102 attackspambots
Invalid user va from 207.154.234.102 port 41118
2020-03-25 21:10:52
117.247.253.2 attack
Brute-force attempt banned
2020-03-25 21:07:07
106.13.73.235 attackspambots
Invalid user charissa from 106.13.73.235 port 53660
2020-03-25 21:40:19

Recently Reported IPs

164.111.35.27 56.141.235.138 118.128.177.178 6.162.97.171
206.70.3.214 207.209.149.144 150.239.140.200 17.233.37.200
24.110.96.48 243.39.243.109 151.113.95.41 207.111.133.118
27.168.116.211 29.207.146.9 143.198.199.215 83.100.66.151
69.71.10.45 191.111.1.107 150.155.16.67 12.249.117.187