Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.168.32.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45967
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.168.32.50.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 09:34:18 CST 2022
;; MSG SIZE  rcvd: 106
Host info
50.32.168.104.in-addr.arpa domain name pointer 104-168-32-50-host.colocrossing.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.32.168.104.in-addr.arpa	name = 104-168-32-50-host.colocrossing.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
23.129.64.201 attack
Automatic report - Web App Attack
2019-07-06 05:18:54
45.120.69.35 attackspam
SSH bruteforce
2019-07-06 05:20:20
185.216.140.17 attack
Brute forcing RDP port 3389
2019-07-06 05:37:49
178.128.2.104 attack
NAME : DIGITALOCEAN CIDR : 178.128.0.0/20 SYN Flood DDoS Attack United States - block certain countries :) IP: 178.128.2.104  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-07-06 05:28:06
14.186.214.52 attackspambots
Jul  5 19:58:10 riskplan-s sshd[6977]: Address 14.186.214.52 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jul  5 19:58:10 riskplan-s sshd[6977]: Invalid user admin from 14.186.214.52
Jul  5 19:58:10 riskplan-s sshd[6977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.186.214.52 
Jul  5 19:58:12 riskplan-s sshd[6977]: Failed password for invalid user admin from 14.186.214.52 port 55363 ssh2
Jul  5 19:58:12 riskplan-s sshd[6977]: Connection closed by 14.186.214.52 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.186.214.52
2019-07-06 05:12:31
178.128.158.113 attackbotsspam
2019-07-05T20:58:19.859780abusebot-3.cloudsearch.cf sshd\[9126\]: Invalid user wolfgang from 178.128.158.113 port 42348
2019-07-06 05:27:13
160.119.81.72 attackspambots
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-07-06 04:59:40
104.140.188.50 attackspambots
scan z
2019-07-06 05:20:02
142.93.241.93 attack
Jul  5 23:02:54 meumeu sshd[11936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.241.93 
Jul  5 23:02:55 meumeu sshd[11936]: Failed password for invalid user deployer from 142.93.241.93 port 35580 ssh2
Jul  5 23:04:59 meumeu sshd[12233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.241.93 
...
2019-07-06 05:16:35
140.143.208.42 attack
Jul  5 21:06:34 * sshd[4678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.208.42
Jul  5 21:06:36 * sshd[4678]: Failed password for invalid user teamspeak3 from 140.143.208.42 port 45226 ssh2
2019-07-06 05:12:46
68.183.179.113 attack
v+ssh-bruteforce
2019-07-06 05:24:07
164.163.99.10 attackbots
Jul  5 20:05:21 dev sshd\[24296\]: Invalid user deploy from 164.163.99.10 port 35313
Jul  5 20:05:21 dev sshd\[24296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.163.99.10
...
2019-07-06 05:14:31
41.235.43.52 attack
Automatic report - SSH Brute-Force Attack
2019-07-06 05:37:18
150.217.34.174 attack
2019-07-05T20:48:39.057048cavecanem sshd[15014]: Invalid user ot from 150.217.34.174 port 50490
2019-07-05T20:48:39.061577cavecanem sshd[15014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.217.34.174
2019-07-05T20:48:39.057048cavecanem sshd[15014]: Invalid user ot from 150.217.34.174 port 50490
2019-07-05T20:48:40.940076cavecanem sshd[15014]: Failed password for invalid user ot from 150.217.34.174 port 50490 ssh2
2019-07-05T20:50:57.385167cavecanem sshd[15688]: Invalid user krishna from 150.217.34.174 port 34848
2019-07-05T20:50:57.387543cavecanem sshd[15688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.217.34.174
2019-07-05T20:50:57.385167cavecanem sshd[15688]: Invalid user krishna from 150.217.34.174 port 34848
2019-07-05T20:50:59.878196cavecanem sshd[15688]: Failed password for invalid user krishna from 150.217.34.174 port 34848 ssh2
2019-07-05T20:53:14.185766cavecanem sshd[16283]: Invali
...
2019-07-06 04:54:42
113.172.14.114 attackspam
Jul  5 19:56:27 lvps87-230-18-106 sshd[22891]: Address 113.172.14.114 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jul  5 19:56:28 lvps87-230-18-106 sshd[22891]: Invalid user admin from 113.172.14.114
Jul  5 19:56:28 lvps87-230-18-106 sshd[22891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.172.14.114 
Jul  5 19:56:29 lvps87-230-18-106 sshd[22891]: Failed password for invalid user admin from 113.172.14.114 port 38849 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.172.14.114
2019-07-06 05:11:17

Recently Reported IPs

104.160.8.101 104.168.148.156 104.160.17.32 104.171.242.186
104.157.103.204 104.196.141.167 104.196.121.150 104.172.69.52
104.196.152.129 104.199.14.30 104.196.26.151 104.184.75.123
104.177.20.225 104.196.199.16 104.200.29.115 104.200.151.124
104.200.131.248 104.200.29.166 104.200.29.59 104.200.29.91