Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.239.200.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35502
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.239.200.50.			IN	A

;; AUTHORITY SECTION:
.			217	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023011100 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 11 20:58:58 CST 2023
;; MSG SIZE  rcvd: 106
Host info
50.200.239.80.in-addr.arpa domain name pointer 80-239-200-50.teliacarrier-cust.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.200.239.80.in-addr.arpa	name = 80-239-200-50.teliacarrier-cust.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
125.220.210.185 attackspambots
IP blocked
2020-05-01 17:06:39
183.6.117.27 attackspam
Invalid user jira from 183.6.117.27 port 49584
2020-05-01 16:50:35
106.124.142.64 attackspambots
Invalid user spec from 106.124.142.64 port 40063
2020-05-01 17:12:16
49.247.131.96 attackbots
Invalid user ywb from 49.247.131.96 port 35500
2020-05-01 17:27:26
106.54.65.139 attackspambots
Invalid user ftest from 106.54.65.139 port 40336
2020-05-01 17:13:00
159.65.255.153 attackspam
Invalid user mark from 159.65.255.153 port 55318
2020-05-01 16:58:16
47.176.39.218 attack
Invalid user pri from 47.176.39.218 port 21671
2020-05-01 17:29:55
189.112.12.107 attackspambots
2020-05-01T08:47:42.664421homeassistant sshd[21948]: Invalid user jacopo from 189.112.12.107 port 3585
2020-05-01T08:47:42.671137homeassistant sshd[21948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.12.107
...
2020-05-01 16:48:26
162.243.232.174 attack
Invalid user desktop from 162.243.232.174 port 41322
2020-05-01 16:58:01
152.136.102.131 attackbotsspam
(sshd) Failed SSH login from 152.136.102.131 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May  1 09:17:46 amsweb01 sshd[10268]: Invalid user manufacturing from 152.136.102.131 port 58586
May  1 09:17:49 amsweb01 sshd[10268]: Failed password for invalid user manufacturing from 152.136.102.131 port 58586 ssh2
May  1 09:21:25 amsweb01 sshd[10603]: Invalid user chenrongyan from 152.136.102.131 port 43962
May  1 09:21:28 amsweb01 sshd[10603]: Failed password for invalid user chenrongyan from 152.136.102.131 port 43962 ssh2
May  1 09:23:31 amsweb01 sshd[10697]: Invalid user cogan from 152.136.102.131 port 39328
2020-05-01 16:59:12
106.75.152.95 attackspambots
May  1 09:56:13 eventyay sshd[25638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.152.95
May  1 09:56:15 eventyay sshd[25638]: Failed password for invalid user bip from 106.75.152.95 port 45910 ssh2
May  1 10:02:00 eventyay sshd[25845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.152.95
...
2020-05-01 17:12:31
138.197.163.11 attack
Invalid user yanjun from 138.197.163.11 port 47326
2020-05-01 17:01:15
52.78.195.135 attack
Invalid user rainer from 52.78.195.135 port 41794
2020-05-01 17:23:53
75.139.131.203 attackspambots
Invalid user om from 75.139.131.203 port 34264
2020-05-01 17:20:29
51.77.147.5 attackbots
5x Failed Password
2020-05-01 17:26:21

Recently Reported IPs

223.63.189.148 14.112.214.48 203.31.17.144 155.163.12.242
128.247.133.7 134.205.187.80 124.205.239.247 81.162.249.202
177.78.254.63 189.15.7.94 121.78.223.110 90.97.250.69
27.168.110.81 94.249.90.171 195.26.17.5 169.23.99.253
13.136.49.65 80.112.13.207 7.43.90.37 36.56.201.143