Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.17.64.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54755
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.17.64.50.			IN	A

;; AUTHORITY SECTION:
.			388	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021601 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 05:07:18 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 50.64.17.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.64.17.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
66.249.70.23 attackspambots
Lines containing failures of 66.249.70.23
/var/log/apache/pucorp.org.log:66.249.70.23 - - [06/Oct/2019:00:30:38 +0200] "GET /robots.txt HTTP/1.1" 200 5892 "-" "Mozilla/5.0 (compatible; Googlebot/2.1; +hxxp://www.google.com/bot.html)"
/var/log/apache/pucorp.org.log:66.249.70.23 - - [06/Oct/2019:00:30:38 +0200] "GET / HTTP/1.1" 200 11492 "-" "Mozilla/5.0 (Linux; user 6.0.1; Nexus 5X Build/MMB29P) AppleWebKhostname/537.36 (KHTML, like Gecko) Chrome/41.0.2272.96 Mobile Safari/537.36 (compatible; Googlebot/2.1; +hxxp://www.google.com/bot.html)"


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=66.249.70.23
2019-10-07 20:02:30
27.193.174.59 attackspambots
Unauthorised access (Oct  7) SRC=27.193.174.59 LEN=40 TTL=49 ID=32871 TCP DPT=8080 WINDOW=27387 SYN 
Unauthorised access (Oct  6) SRC=27.193.174.59 LEN=40 TTL=49 ID=14126 TCP DPT=8080 WINDOW=27387 SYN 
Unauthorised access (Oct  6) SRC=27.193.174.59 LEN=40 TTL=49 ID=2895 TCP DPT=8080 WINDOW=57628 SYN
2019-10-07 19:45:45
178.128.217.135 attackspam
2019-10-07T07:11:06.4450161495-001 sshd\[24673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.135  user=root
2019-10-07T07:11:08.4009801495-001 sshd\[24673\]: Failed password for root from 178.128.217.135 port 60276 ssh2
2019-10-07T07:15:50.0747271495-001 sshd\[25032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.135  user=root
2019-10-07T07:15:52.3519451495-001 sshd\[25032\]: Failed password for root from 178.128.217.135 port 43602 ssh2
2019-10-07T07:20:34.9103321495-001 sshd\[25369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.135  user=root
2019-10-07T07:20:36.5098091495-001 sshd\[25369\]: Failed password for root from 178.128.217.135 port 55168 ssh2
...
2019-10-07 19:45:27
220.166.78.25 attackbots
Oct  7 13:40:12 v22019058497090703 sshd[16379]: Failed password for root from 220.166.78.25 port 56663 ssh2
Oct  7 13:44:22 v22019058497090703 sshd[16648]: Failed password for root from 220.166.78.25 port 44496 ssh2
...
2019-10-07 20:10:40
31.133.67.100 attackbotsspam
Automatic report - Port Scan Attack
2019-10-07 19:39:12
77.49.237.48 attackspambots
Honeypot attack, port: 23, PTR: 77.49.237.48.dsl.dyn.forthnet.gr.
2019-10-07 19:52:25
139.59.79.56 attackbots
Oct  7 07:59:36 core sshd[15150]: Invalid user jboss from 139.59.79.56 port 56686
Oct  7 07:59:37 core sshd[15150]: Failed password for invalid user jboss from 139.59.79.56 port 56686 ssh2
...
2019-10-07 19:42:46
58.218.66.177 attackbotsspam
Port 1433 Scan
2019-10-07 19:35:10
185.30.118.67 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/185.30.118.67/ 
 RU - 1H : (191)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN51607 
 
 IP : 185.30.118.67 
 
 CIDR : 185.30.118.0/23 
 
 PREFIX COUNT : 2 
 
 UNIQUE IP COUNT : 768 
 
 
 WYKRYTE ATAKI Z ASN51607 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-07 13:48:44 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-07 20:06:14
46.229.168.163 attackbots
Unauthorized access detected from banned ip
2019-10-07 20:06:59
177.76.85.127 attackbotsspam
scan z
2019-10-07 19:44:07
148.70.249.72 attackspambots
Oct  7 03:58:15 www_kotimaassa_fi sshd[21824]: Failed password for root from 148.70.249.72 port 38088 ssh2
...
2019-10-07 19:37:29
51.159.30.31 attackspambots
Automated report (2019-10-07T11:48:32+00:00). Faked user agent detected.
2019-10-07 20:13:27
80.85.70.20 attack
Oct  7 02:02:25 tdfoods sshd\[4522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.85.70.20  user=root
Oct  7 02:02:27 tdfoods sshd\[4522\]: Failed password for root from 80.85.70.20 port 41652 ssh2
Oct  7 02:05:40 tdfoods sshd\[4762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.85.70.20  user=root
Oct  7 02:05:43 tdfoods sshd\[4762\]: Failed password for root from 80.85.70.20 port 53444 ssh2
Oct  7 02:09:07 tdfoods sshd\[5170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.85.70.20  user=root
2019-10-07 20:10:15
27.73.9.167 attack
Honeypot attack, port: 445, PTR: localhost.
2019-10-07 19:49:11

Recently Reported IPs

104.17.64.19 104.17.65.1 104.17.65.19 104.17.65.50
104.17.66.1 104.17.67.24 76.50.79.103 104.17.68.24
104.17.68.92 104.17.69.15 104.17.69.67 104.17.69.92
104.17.7.210 104.17.70.15 104.17.70.67 104.17.71.237
104.17.72.237 104.17.77.53 104.17.78.34 104.17.78.53