Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.42.69.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15533
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;108.42.69.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022301 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 10:38:25 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 50.69.42.108.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.69.42.108.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
184.106.158.191 attack
Scanning
2020-01-16 04:40:58
201.253.222.145 attackspambots
Unauthorized connection attempt detected from IP address 201.253.222.145 to port 23
2020-01-16 04:26:43
189.115.20.94 attackbotsspam
Unauthorized connection attempt detected from IP address 189.115.20.94 to port 23
2020-01-16 04:08:55
208.111.123.188 attack
Unauthorized connection attempt detected from IP address 208.111.123.188 to port 23 [J]
2020-01-16 04:06:49
200.194.14.73 attack
Unauthorized connection attempt detected from IP address 200.194.14.73 to port 23
2020-01-16 04:27:30
121.144.33.11 attack
Unauthorized connection attempt detected from IP address 121.144.33.11 to port 5555 [J]
2020-01-16 04:13:16
201.119.210.226 attackspam
Unauthorized connection attempt detected from IP address 201.119.210.226 to port 80 [J]
2020-01-16 04:27:05
138.94.84.219 attackbots
Unauthorized connection attempt detected from IP address 138.94.84.219 to port 8000
2020-01-16 04:12:51
200.194.61.53 attack
Unauthorized connection attempt detected from IP address 200.194.61.53 to port 23
2020-01-16 04:07:32
46.171.210.134 attack
Unauthorized connection attempt detected from IP address 46.171.210.134 to port 23 [J]
2020-01-16 04:23:48
54.37.67.144 attack
Jan 15 21:32:09 ourumov-web sshd\[31707\]: Invalid user captain from 54.37.67.144 port 57642
Jan 15 21:32:09 ourumov-web sshd\[31707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.67.144
Jan 15 21:32:11 ourumov-web sshd\[31707\]: Failed password for invalid user captain from 54.37.67.144 port 57642 ssh2
...
2020-01-16 04:43:01
2.136.191.82 attackspambots
Unauthorized connection attempt detected from IP address 2.136.191.82 to port 23 [J]
2020-01-16 04:25:29
172.105.158.159 attackbots
Automatic report - Windows Brute-Force Attack
2020-01-16 04:33:06
85.96.189.43 attack
Unauthorized connection attempt detected from IP address 85.96.189.43 to port 23
2020-01-16 04:18:16
61.177.172.128 attackspambots
Jan 15 21:35:58 h2177944 sshd\[8697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.128  user=root
Jan 15 21:35:59 h2177944 sshd\[8697\]: Failed password for root from 61.177.172.128 port 25113 ssh2
Jan 15 21:36:03 h2177944 sshd\[8697\]: Failed password for root from 61.177.172.128 port 25113 ssh2
Jan 15 21:36:06 h2177944 sshd\[8697\]: Failed password for root from 61.177.172.128 port 25113 ssh2
...
2020-01-16 04:36:43

Recently Reported IPs

115.239.213.254 15.96.217.136 142.12.136.187 53.239.255.154
164.72.217.72 104.44.180.155 145.14.175.158 212.195.8.38
234.231.81.153 198.91.89.135 171.151.4.13 167.14.77.97
23.11.117.221 202.254.216.204 88.251.77.100 171.77.93.177
186.116.135.87 57.169.28.37 12.41.107.116 85.199.22.192