Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Serbia

Internet Service Provider: unknown

Hostname: unknown

Organization: YUnet International d.o.o.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.121.75.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24900
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;109.121.75.50.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jun 03 21:47:32 CST 2019
;; MSG SIZE  rcvd: 117

Host info
50.75.121.109.in-addr.arpa domain name pointer dynamic-109-121-75-50.adsl.eunet.rs.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
50.75.121.109.in-addr.arpa	name = dynamic-109-121-75-50.adsl.eunet.rs.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.188 attack
03/08/2020-17:54:00.449266 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-03-09 05:54:24
54.39.145.59 attackbotsspam
Mar  9 03:04:03 areeb-Workstation sshd[4122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.145.59 
Mar  9 03:04:05 areeb-Workstation sshd[4122]: Failed password for invalid user arul from 54.39.145.59 port 34764 ssh2
...
2020-03-09 05:49:13
76.214.112.45 attackspam
Mar  9 00:30:24 server sshd\[13833\]: Invalid user robot from 76.214.112.45
Mar  9 00:30:24 server sshd\[13833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.214.112.45 
Mar  9 00:30:25 server sshd\[13833\]: Failed password for invalid user robot from 76.214.112.45 port 40946 ssh2
Mar  9 00:35:59 server sshd\[14808\]: Invalid user l4d from 76.214.112.45
Mar  9 00:35:59 server sshd\[14808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.214.112.45 
...
2020-03-09 06:00:28
34.94.111.220 attackspam
$f2bV_matches
2020-03-09 06:05:40
35.220.174.24 attackbots
2020-03-08T21:24:40.088695abusebot-7.cloudsearch.cf sshd[11812]: Invalid user cpanelconnecttrack from 35.220.174.24 port 40828
2020-03-08T21:24:40.092615abusebot-7.cloudsearch.cf sshd[11812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.174.220.35.bc.googleusercontent.com
2020-03-08T21:24:40.088695abusebot-7.cloudsearch.cf sshd[11812]: Invalid user cpanelconnecttrack from 35.220.174.24 port 40828
2020-03-08T21:24:42.938175abusebot-7.cloudsearch.cf sshd[11812]: Failed password for invalid user cpanelconnecttrack from 35.220.174.24 port 40828 ssh2
2020-03-08T21:32:09.537539abusebot-7.cloudsearch.cf sshd[12273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.174.220.35.bc.googleusercontent.com  user=root
2020-03-08T21:32:12.097274abusebot-7.cloudsearch.cf sshd[12273]: Failed password for root from 35.220.174.24 port 50806 ssh2
2020-03-08T21:33:47.878209abusebot-7.cloudsearch.cf sshd[12354]: Invalid u
...
2020-03-09 06:10:20
62.210.246.39 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 62.210.246.39 (62-210-246-39.rev.poneytelecom.eu): 5 in the last 3600 secs - Sun Sep 16 00:35:24 2018
2020-03-09 06:19:58
150.223.8.163 attackspambots
suspicious action Sun, 08 Mar 2020 18:33:52 -0300
2020-03-09 06:01:41
221.225.189.121 attackbotsspam
lfd: (smtpauth) Failed SMTP AUTH login from 221.225.189.121 (CN/China/-): 5 in the last 3600 secs - Sun Sep 16 07:27:23 2018
2020-03-09 06:08:45
109.239.252.218 attackbotsspam
Port probing on unauthorized port 8080
2020-03-09 06:16:28
188.78.170.132 attack
Mar  8 22:01:09 vpn01 sshd[21763]: Failed password for root from 188.78.170.132 port 54530 ssh2
...
2020-03-09 05:59:57
180.108.20.228 attackspam
lfd: (smtpauth) Failed SMTP AUTH login from 180.108.20.228 (CN/China/-): 5 in the last 3600 secs - Fri Sep 14 23:27:08 2018
2020-03-09 06:21:29
114.218.138.106 attackbotsspam
lfd: (smtpauth) Failed SMTP AUTH login from 114.218.138.106 (CN/China/-): 5 in the last 3600 secs - Sun Sep 16 04:56:35 2018
2020-03-09 06:16:17
45.147.200.235 attack
Mar  8 11:24:20 eddieflores sshd\[18079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=xunlei.dasmkl.cn  user=root
Mar  8 11:24:22 eddieflores sshd\[18079\]: Failed password for root from 45.147.200.235 port 46570 ssh2
Mar  8 11:34:03 eddieflores sshd\[18808\]: Invalid user taeyoung from 45.147.200.235
Mar  8 11:34:03 eddieflores sshd\[18808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=xunlei.dasmkl.cn
Mar  8 11:34:04 eddieflores sshd\[18808\]: Failed password for invalid user taeyoung from 45.147.200.235 port 57768 ssh2
2020-03-09 05:49:47
202.179.31.86 attack
1583703231 - 03/08/2020 22:33:51 Host: 202.179.31.86/202.179.31.86 Port: 445 TCP Blocked
2020-03-09 06:02:49
43.226.72.38 attack
lfd: (smtpauth) Failed SMTP AUTH login from 43.226.72.38 (CN/China/-): 5 in the last 3600 secs - Sun Sep 16 01:02:06 2018
2020-03-09 06:18:18

Recently Reported IPs

119.120.250.108 159.65.139.162 168.36.89.50 150.39.72.210
12.232.153.242 88.99.172.223 187.79.151.90 220.135.219.7
115.35.57.216 107.8.110.50 183.1.34.189 139.204.41.251
88.87.85.180 165.146.14.80 12.51.27.16 88.204.216.142
186.155.249.94 35.69.70.84 88.153.128.51 121.34.243.143