Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 95.214.245.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19014
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;95.214.245.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 15:25:59 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 50.245.214.95.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.245.214.95.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.54.157.6 attackspambots
Oct 26 14:29:07 venus sshd\[30324\]: Invalid user Qaz123456789 from 202.54.157.6 port 40960
Oct 26 14:29:07 venus sshd\[30324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.54.157.6
Oct 26 14:29:09 venus sshd\[30324\]: Failed password for invalid user Qaz123456789 from 202.54.157.6 port 40960 ssh2
...
2019-10-26 22:41:23
172.68.59.42 attackbots
Fake GoogleBot
2019-10-26 23:00:40
172.68.59.252 attackbotsspam
Fake GoogleBot
2019-10-26 23:01:41
112.133.243.11 attack
Unauthorized connection attempt from IP address 112.133.243.11 on Port 445(SMB)
2019-10-26 22:54:11
162.158.75.214 attack
Fake GoogleBot
2019-10-26 23:20:20
54.37.36.124 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-10-26 22:40:28
202.83.17.223 attack
Oct 26 16:18:35 bouncer sshd\[17630\]: Invalid user test from 202.83.17.223 port 52990
Oct 26 16:18:35 bouncer sshd\[17630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.17.223 
Oct 26 16:18:37 bouncer sshd\[17630\]: Failed password for invalid user test from 202.83.17.223 port 52990 ssh2
...
2019-10-26 22:36:19
192.227.210.138 attackbots
2019-10-26T14:08:55.743194abusebot-7.cloudsearch.cf sshd\[24658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.210.138  user=root
2019-10-26 23:06:11
80.211.115.16 attackbotsspam
SSH Bruteforce
2019-10-26 22:40:11
195.175.76.34 attack
Unauthorized connection attempt from IP address 195.175.76.34 on Port 445(SMB)
2019-10-26 22:50:13
78.188.36.149 attack
Unauthorized connection attempt from IP address 78.188.36.149 on Port 445(SMB)
2019-10-26 22:42:54
103.213.208.26 attack
Unauthorized connection attempt from IP address 103.213.208.26 on Port 445(SMB)
2019-10-26 23:14:25
148.70.192.84 attack
Oct 26 18:56:25 lcl-usvr-02 sshd[22295]: Invalid user samples from 148.70.192.84 port 56062
Oct 26 18:56:25 lcl-usvr-02 sshd[22295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.192.84
Oct 26 18:56:25 lcl-usvr-02 sshd[22295]: Invalid user samples from 148.70.192.84 port 56062
Oct 26 18:56:27 lcl-usvr-02 sshd[22295]: Failed password for invalid user samples from 148.70.192.84 port 56062 ssh2
Oct 26 19:01:52 lcl-usvr-02 sshd[23583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.192.84  user=root
Oct 26 19:01:53 lcl-usvr-02 sshd[23583]: Failed password for root from 148.70.192.84 port 37620 ssh2
...
2019-10-26 22:47:44
114.215.142.49 attackbots
php WP PHPmyadamin ABUSE blocked for 12h
2019-10-26 22:39:46
124.243.198.190 attackspambots
SSH Brute-Force reported by Fail2Ban
2019-10-26 22:58:58

Recently Reported IPs

205.152.113.121 185.188.50.253 43.72.121.91 244.72.108.57
23.188.213.179 255.16.21.200 146.27.183.31 13.102.137.207
113.52.212.235 117.204.159.228 95.125.240.103 227.203.217.215
160.174.142.150 3.204.107.223 122.117.230.147 21.85.125.195
200.246.90.5 241.72.159.18 82.102.89.80 174.122.26.149