Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.213.194.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5577
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.213.194.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 04:51:08 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 50.194.213.99.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.194.213.99.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.37.86.192 attackbotsspam
Invalid user amavisd from 54.37.86.192 port 56204
2020-10-11 02:02:51
190.199.230.47 attackbots
Unauthorized connection attempt from IP address 190.199.230.47 on Port 445(SMB)
2020-10-11 02:21:20
89.248.168.157 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 78 - port: 2080 proto: tcp cat: Misc Attackbytes: 60
2020-10-11 02:13:51
49.232.71.199 attack
prod11
...
2020-10-11 02:32:59
85.99.16.236 attack
Unauthorized connection attempt from IP address 85.99.16.236 on Port 445(SMB)
2020-10-11 02:32:33
218.77.105.226 attack
Oct 10 01:33:02 h2646465 sshd[12697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.77.105.226  user=root
Oct 10 01:33:04 h2646465 sshd[12697]: Failed password for root from 218.77.105.226 port 39390 ssh2
Oct 10 01:46:37 h2646465 sshd[14547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.77.105.226  user=root
Oct 10 01:46:40 h2646465 sshd[14547]: Failed password for root from 218.77.105.226 port 46754 ssh2
Oct 10 01:50:37 h2646465 sshd[15123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.77.105.226  user=root
Oct 10 01:50:39 h2646465 sshd[15123]: Failed password for root from 218.77.105.226 port 48218 ssh2
Oct 10 01:52:45 h2646465 sshd[15180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.77.105.226  user=root
Oct 10 01:52:46 h2646465 sshd[15180]: Failed password for root from 218.77.105.226 port 34826 ssh2
Oct 10 01:54:43 h264
2020-10-11 02:33:27
212.83.148.177 attackspambots
[2020-10-10 09:15:30] NOTICE[1182] chan_sip.c: Registration from '"427"' failed for '212.83.148.177:7053' - Wrong password
[2020-10-10 09:15:30] SECURITY[1204] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-10-10T09:15:30.028-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="427",SessionID="0x7f22f8572958",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.83.148.177/7053",Challenge="49f139a7",ReceivedChallenge="49f139a7",ReceivedHash="9d9d6ddcac527154926305de6353959a"
[2020-10-10 09:23:04] NOTICE[1182] chan_sip.c: Registration from '"425"' failed for '212.83.148.177:6962' - Wrong password
[2020-10-10 09:23:04] SECURITY[1204] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-10-10T09:23:04.611-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="425",SessionID="0x7f22f854d238",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.83.
...
2020-10-11 02:04:24
222.110.147.61 attackbots
 TCP (SYN) 222.110.147.61:60356 -> port 22, len 44
2020-10-11 02:20:11
106.54.98.89 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-10T12:29:40Z and 2020-10-10T12:35:41Z
2020-10-11 02:10:08
218.92.0.246 attackbots
Oct 10 20:29:12 db sshd[25280]: User root from 218.92.0.246 not allowed because none of user's groups are listed in AllowGroups
...
2020-10-11 02:30:50
78.157.40.106 attackbots
3x Failed Password
2020-10-11 02:16:10
46.101.248.180 attack
Oct 10 22:23:45 mx sshd[1330536]: Failed password for invalid user art from 46.101.248.180 port 52716 ssh2
Oct 10 22:27:51 mx sshd[1330670]: Invalid user polycom from 46.101.248.180 port 58008
Oct 10 22:27:51 mx sshd[1330670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.248.180 
Oct 10 22:27:51 mx sshd[1330670]: Invalid user polycom from 46.101.248.180 port 58008
Oct 10 22:27:52 mx sshd[1330670]: Failed password for invalid user polycom from 46.101.248.180 port 58008 ssh2
...
2020-10-11 02:23:34
150.158.6.42 attackbotsspam
Port scan denied
2020-10-11 02:30:07
59.94.147.3 attack
Unauthorized connection attempt from IP address 59.94.147.3 on Port 445(SMB)
2020-10-11 02:19:39
221.127.42.228 attack
Oct  9 22:00:49 ssh2 sshd[18322]: User root from 221.127.42.228 not allowed because not listed in AllowUsers
Oct  9 22:00:49 ssh2 sshd[18322]: Failed password for invalid user root from 221.127.42.228 port 42098 ssh2
Oct  9 22:00:50 ssh2 sshd[18322]: Connection closed by invalid user root 221.127.42.228 port 42098 [preauth]
...
2020-10-11 02:22:19

Recently Reported IPs

132.242.53.218 94.212.17.25 73.136.201.206 44.208.13.108
229.245.3.235 219.120.99.90 255.29.230.65 250.52.140.242
79.78.159.33 166.178.247.115 8.211.159.20 175.50.194.214
245.229.242.58 53.44.169.190 254.235.156.250 251.157.194.217
136.226.101.15 131.21.86.118 233.50.161.151 114.35.86.243