Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.129.50.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64924
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.129.50.118.			IN	A

;; AUTHORITY SECTION:
.			519	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 26 00:38:16 CST 2022
;; MSG SIZE  rcvd: 107
Host info
118.50.129.104.in-addr.arpa domain name pointer 104.129.50.118.static.quadranet.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
118.50.129.104.in-addr.arpa	name = 104.129.50.118.static.quadranet.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
66.240.205.34 attack
Unauthorized connection attempt detected from IP address 66.240.205.34 to port 1177
2020-05-07 02:19:47
37.49.226.3 attack
firewall-block, port(s): 8443/tcp, 50802/tcp
2020-05-07 02:25:49
162.243.142.219 attackspam
scans once in preceeding hours on the ports (in chronological order) 5138 resulting in total of 58 scans from 162.243.0.0/16 block.
2020-05-07 02:48:09
185.176.27.34 attack
Fail2Ban Ban Triggered
2020-05-07 02:33:20
206.189.182.217 attack
scans once in preceeding hours on the ports (in chronological order) 8810 resulting in total of 7 scans from 206.189.0.0/16 block.
2020-05-07 02:27:06
185.176.27.30 attack
05/06/2020-13:48:57.715675 185.176.27.30 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-07 02:33:33
167.172.113.221 attackbotsspam
scans once in preceeding hours on the ports (in chronological order) 2046 resulting in total of 9 scans from 167.172.0.0/16 block.
2020-05-07 02:39:44
94.102.49.190 attack
" "
2020-05-07 02:55:46
5.101.0.209 attack
Unauthorized connection attempt detected from IP address 5.101.0.209 to port 443
2020-05-07 02:26:24
162.243.143.206 attackbotsspam
Unauthorized connection attempt detected from IP address 162.243.143.206 to port 502
2020-05-07 02:46:04
162.243.144.201 attack
514/tcp 83/tcp 1911/tcp...
[2020-04-29/05-06]6pkt,6pt.(tcp)
2020-05-07 02:42:46
2.147.209.98 attack
scans 2 times in preceeding hours on the ports (in chronological order) 5900 5900
2020-05-07 02:26:47
184.105.139.95 attackbots
scans once in preceeding hours on the ports (in chronological order) 11211 resulting in total of 8 scans from 184.105.0.0/16 block.
2020-05-07 02:36:39
162.243.142.131 attackspam
ZGrab Application Layer Scanner Detection
2020-05-07 02:48:32
162.243.143.246 attackbotsspam
firewall-block, port(s): 28017/tcp
2020-05-07 02:45:21

Recently Reported IPs

104.129.54.108 104.129.50.135 104.129.50.166 104.129.50.248
104.129.47.192 104.129.54.105 104.129.47.57 104.129.54.110
104.129.47.23 104.129.54.112 104.129.54.117 104.129.54.70
104.129.54.81 104.129.56.138 104.129.6.103 104.129.54.72
104.129.54.88 104.129.54.82 104.129.56.93 104.129.60.33