Go
50.63.202.63
is an
Abuser
100 %
United States
Report Abuse
16abuse reported
6Email Spam
4Web SpamForum Spam
3Bad Web Bot
1Web SpamBad Web Bot
1Web Spam
1uncategorized
13attacks reported
5uncategorized
2PhishingEmail Spam
2Brute-ForceMailserver Attack
1PhishingEmail SpamSpoofing
1Port Scan
1DDoS AttackBad Web BotExploited Host
1Email Spam
4malware reported
4Malware
3organizations reported
3uncategorized
3reputation reported
3uncategorized
from 8 distinct reporters
and 6 distinct sources : Emerging Threats, FireHOL, hpHosts, StopForumSpam.com, BadIPs.com, AbuseIPDB
50.63.202.63 was first signaled at 2018-05-01 07:20 and last record was at 2019-06-28 16:26.
IP

50.63.202.63

Organization
GoDaddy.com, LLC
Localisation
United States
Arizona, Scottsdale
NetRange : First & Last IP
50.62.0.0 - 50.63.255.255
Network CIDR
50.62.0.0/15

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2019-06-28 16:26 attacks PhishingEmail SpamSpoofing AbuseIPDB pretending to be cra
2019-05-05 15:14 abuse Bad Web Bot AbuseIPDB ET CNC Zeus Tracker Reported CnC Server group 16
2019-05-01 10:25 abuse Bad Web Bot AbuseIPDB ET CNC Zeus Tracker Reported CnC Server group 16
2019-04-08 02:28 abuse Bad Web Bot AbuseIPDB From Untangle Suricata log 2019-04-08 02:58:42 am 2404165 1 21 192.168.XXX.XXX 10037 50.63.202.63 389 TCP [6] false botcc trojan-activity ET CNC Zeus
2019-04-04 11:32 abuse Web SpamBad Web Bot AbuseIPDB A Network Trojan was Detected. Signature ET CNC Zeus Tracker Reported CnC Server group 16
2019-03-28 21:37 abuse Email Spam AbuseIPDB  
2019-02-18 09:00 abuse Email Spam AbuseIPDB multiple email spams from markreseau.com. Please do something about this problem.
2018-11-14 12:55 attacks Port Scan AbuseIPDB Network trojan
2018-10-27 12:45 attacks PhishingEmail Spam AbuseIPDB  
2018-08-07 05:28 abuse Web Spam AbuseIPDB  
2018-07-31 23:02 attacks DDoS AttackBad Web BotExploited Host AbuseIPDB Malware
2018-06-11 02:16 abuse Email Spam AbuseIPDB  
2018-06-05 23:56 abuse Email Spam AbuseIPDB  
2018-05-24 09:47 attacks PhishingEmail Spam AbuseIPDB [email protected]; Received: from DES004 (171.48.17.213) by with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SH
2018-05-04 20:21 abuse Email Spam AbuseIPDB stupid indian spam
2018-05-01 07:20 abuse Email Spam AbuseIPDB [email protected]; Received: from DES004 (171.61.101.136) by ; Tue, 1 May 2018 15:24:51 +0000 From: "Sabrina Cox" <[email prot
2019-03-29 18:23 organizations coinbl_hosts  
2019-03-29 18:24 attacks et_block Emerging Threats  
2019-03-29 18:27 attacks firehol_level3 FireHOL  
2019-03-29 18:35 malware Malware hphosts_emd hpHosts  
2019-03-29 18:35 reputation hphosts_fsa  
2019-03-29 18:35 reputation hphosts_mmt  
2019-03-29 18:35 reputation hphosts_psh  
2019-03-29 18:42 malware Malware ransomware_feed  
2019-03-29 18:55 malware Malware zeus  
2019-03-29 18:55 malware Malware zeus_badips  
2019-05-28 23:28 abuse firehol_abusers_30d FireHOL  
2019-05-28 23:34 organizations hphosts_ats  
2019-05-28 23:41 abuse Web SpamForum Spam stopforumspam StopForumSpam.com  
2019-05-28 23:41 abuse Web SpamForum Spam stopforumspam_180d StopForumSpam.com  
2019-05-28 23:43 abuse Web SpamForum Spam stopforumspam_365d StopForumSpam.com  
2019-05-28 23:45 abuse Web SpamForum Spam stopforumspam_90d StopForumSpam.com  
2019-06-03 22:43 attacks bi_any_0_1d BadIPs.com  
2019-06-03 22:43 attacks bi_assp_0_1d BadIPs.com  
2019-06-03 22:44 attacks Brute-ForceMailserver Attack bi_mail_0_1d BadIPs.com  
2019-06-03 22:44 attacks Brute-ForceMailserver Attack bi_postfix_0_1d BadIPs.com  
2019-06-03 22:44 attacks Email Spam bi_spam_0_1d BadIPs.com  
2019-03-29 18:23 organizations datacenters  
2019-03-29 18:34 attacks firehol_webserver FireHOL  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

NetRange: 50.62.0.0 - 50.63.255.255
CIDR: 50.62.0.0/15
NetName: GO-DADDY-COM-LLC
NetHandle: NET-50-62-0-0-1
Parent: NET50 (NET-50-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS26496
Organization: GoDaddy.com, LLC (GODAD)
RegDate: 2011-02-02
Updated: 2014-02-25
Comment: Please send abuse complaints to abuse@godaddy.com
Ref: https://rdap.arin.net/registry/ip/ 50.62.0.0

OrgName: GoDaddy.com, LLC
OrgId: GODAD
Address: 14455 N Hayden Road
Address: Suite 226
City: Scottsdale
StateProv: AZ
PostalCode: 85260
Country: US
RegDate: 2007-06-01
Updated: 2014-09-10
Comment: Please send abuse complaints to abuse@godaddy.com
Ref: https://rdap.arin.net/registry/entity/GODAD

OrgAbuseHandle: ABUSE51-ARIN
OrgAbuseName: Abuse Department
OrgAbusePhone: +1-480-624-2505
OrgAbuseEmail: abuse@godaddy.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE51-ARIN

OrgTechHandle: NOC124-ARIN
OrgTechName: Network Operations Center
OrgTechPhone: +1-480-505-8809
OrgTechEmail: noc@godaddy.com
OrgTechRef: https://rdap.arin.net/registry/entity/NOC124-ARIN

OrgNOCHandle: NOC124-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: +1-480-505-8809
OrgNOCEmail: noc@godaddy.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC124-ARIN

RNOCHandle: NOC124-ARIN
RNOCName: Network Operations Center
RNOCPhone: +1-480-505-8809
RNOCEmail: noc@godaddy.com
RNOCRef: https://rdap.arin.net/registry/entity/NOC124-ARIN

RTechHandle: NOC124-ARIN
RTechName: Network Operations Center
RTechPhone: +1-480-505-8809
RTechEmail: noc@godaddy.com
RTechRef: https://rdap.arin.net/registry/entity/NOC124-ARIN

RAbuseHandle: ABUSE51-ARIN
RAbuseName: Abuse Department
RAbusePhone: +1-480-624-2505
RAbuseEmail: abuse@godaddy.com
RAbuseRef: https://rdap.arin.net/registry/entity/ABUSE51-ARIN
most specific ip range is highlighted
Updated : 2020-02-02