Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Diego

Region: California

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: AT&T Services, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.50.202.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31726
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;99.50.202.47.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jun 03 20:44:53 CST 2019
;; MSG SIZE  rcvd: 116

Host info
47.202.50.99.in-addr.arpa domain name pointer 99-50-202-47.lightspeed.sndgca.sbcglobal.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
47.202.50.99.in-addr.arpa	name = 99-50-202-47.lightspeed.sndgca.sbcglobal.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
89.210.143.54 attackbotsspam
Autoban   89.210.143.54 AUTH/CONNECT
2019-08-05 14:04:03
89.64.26.243 attackbotsspam
Autoban   89.64.26.243 AUTH/CONNECT
2019-08-05 13:46:04
90.148.230.114 attackspam
Autoban   90.148.230.114 AUTH/CONNECT
2019-08-05 13:39:02
89.64.43.16 attack
Autoban   89.64.43.16 AUTH/CONNECT
2019-08-05 13:44:27
5.3.6.82 attack
Feb 22 14:40:35 motanud sshd\[23766\]: Invalid user ts3 from 5.3.6.82 port 38732
Feb 22 14:40:35 motanud sshd\[23766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.3.6.82
Feb 22 14:40:37 motanud sshd\[23766\]: Failed password for invalid user ts3 from 5.3.6.82 port 38732 ssh2
2019-08-05 14:10:27
70.29.106.63 attack
Aug  5 06:58:37 lnxded63 sshd[32208]: Failed password for root from 70.29.106.63 port 38048 ssh2
Aug  5 06:58:37 lnxded63 sshd[32208]: Failed password for root from 70.29.106.63 port 38048 ssh2
Aug  5 07:02:54 lnxded63 sshd[510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.29.106.63
2019-08-05 13:23:22
91.132.173.135 attackbotsspam
Autoban   91.132.173.135 AUTH/CONNECT
2019-08-05 13:20:20
89.64.131.140 attack
Autoban   89.64.131.140 AUTH/CONNECT
2019-08-05 13:47:42
109.196.15.142 attackspambots
email spam
2019-08-05 13:41:02
200.54.221.202 attackbotsspam
email spam
2019-08-05 13:24:38
91.113.226.62 attackspambots
Autoban   91.113.226.62 AUTH/CONNECT
2019-08-05 13:21:51
89.255.92.206 attackspambots
Autoban   89.255.92.206 AUTH/CONNECT
2019-08-05 13:50:59
89.250.149.114 attack
Autoban   89.250.149.114 AUTH/CONNECT
2019-08-05 13:51:30
34.80.133.2 attack
" "
2019-08-05 13:40:34
5.252.192.249 attackspam
Feb 23 16:40:47 motanud sshd\[7873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.252.192.249  user=root
Feb 23 16:40:50 motanud sshd\[7873\]: Failed password for root from 5.252.192.249 port 51682 ssh2
Feb 23 16:50:07 motanud sshd\[8452\]: Invalid user adminuser from 5.252.192.249 port 35858
Feb 23 16:50:07 motanud sshd\[8452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.252.192.249
2019-08-05 14:12:07

Recently Reported IPs

92.209.65.73 133.98.13.24 35.205.210.55 103.221.235.24
154.183.156.156 160.122.71.218 31.162.58.131 51.75.133.14
209.214.199.228 186.71.83.166 110.169.82.195 220.92.91.191
91.122.184.243 74.153.115.246 126.241.18.134 191.122.226.211
137.183.94.244 31.120.24.16 24.90.169.88 187.3.0.85