Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.93.145.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 109
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.93.145.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020900 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 09 23:47:33 CST 2025
;; MSG SIZE  rcvd: 105
Host info
80.145.93.50.in-addr.arpa domain name pointer ip-50.93.145-80-drisge40-bish-TX.gtek.biz.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.145.93.50.in-addr.arpa	name = ip-50.93.145-80-drisge40-bish-TX.gtek.biz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
181.124.152.6 attackspam
Unauthorized connection attempt from IP address 181.124.152.6 on Port 445(SMB)
2020-03-23 20:57:12
157.245.158.214 attackbots
Mar 23 09:11:28 localhost sshd[1525]: Invalid user alex from 157.245.158.214 port 57088
Mar 23 09:11:28 localhost sshd[1525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.158.214
Mar 23 09:11:28 localhost sshd[1525]: Invalid user alex from 157.245.158.214 port 57088
Mar 23 09:11:30 localhost sshd[1525]: Failed password for invalid user alex from 157.245.158.214 port 57088 ssh2
Mar 23 09:15:43 localhost sshd[1957]: Invalid user pippo from 157.245.158.214 port 44626
...
2020-03-23 21:10:26
80.241.212.182 attackbots
Mar 23 09:04:35 localhost sshd\[14875\]: Invalid user ftpuser from 80.241.212.182 port 61280
Mar 23 09:04:35 localhost sshd\[14875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.241.212.182
Mar 23 09:04:38 localhost sshd\[14875\]: Failed password for invalid user ftpuser from 80.241.212.182 port 61280 ssh2
2020-03-23 21:02:29
109.251.110.3 attack
8080/tcp
[2020-03-23]1pkt
2020-03-23 21:07:39
116.102.139.72 attack
Automatic report - Port Scan Attack
2020-03-23 21:17:01
72.49.114.172 attackspam
[Sun Mar 22 19:38:07 2020] - Syn Flood From IP: 72.49.114.172 Port: 40194
2020-03-23 21:28:15
91.90.15.27 attackspam
Host Scan
2020-03-23 20:58:16
182.150.22.233 attackspambots
Invalid user sunqiu from 182.150.22.233 port 58054
2020-03-23 21:19:46
113.173.167.21 attackspam
445/tcp
[2020-03-23]1pkt
2020-03-23 21:13:41
144.22.98.225 attackspam
Mar 23 09:18:56 ny01 sshd[29183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.22.98.225
Mar 23 09:18:58 ny01 sshd[29183]: Failed password for invalid user nine from 144.22.98.225 port 58679 ssh2
Mar 23 09:23:21 ny01 sshd[31005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.22.98.225
2020-03-23 21:27:16
2a00:1098:84::4 attackbotsspam
Mar 23 13:20:12 l03 sshd[2970]: Invalid user ai from 2a00:1098:84::4 port 36688
...
2020-03-23 21:23:15
79.152.165.196 attackspam
Automatic report - Port Scan Attack
2020-03-23 21:26:35
62.234.155.90 attack
Host Scan
2020-03-23 21:14:07
110.14.255.249 attack
3blackllist
2020-03-23 21:01:43
206.72.194.47 attack
[Mon Feb 24 12:55:36 2020] - Syn Flood From IP: 206.72.194.47 Port: 61778
2020-03-23 20:47:01

Recently Reported IPs

181.219.219.143 250.193.253.200 230.86.85.126 234.38.29.255
152.38.230.16 226.77.121.10 148.154.101.141 161.121.68.197
103.141.197.179 44.96.88.44 135.155.41.19 214.7.249.180
234.208.33.183 181.137.167.144 30.140.11.207 24.184.53.145
159.196.0.66 163.183.175.98 2.214.8.238 16.176.41.251