Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.104.50.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17185
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.104.50.43.			IN	A

;; AUTHORITY SECTION:
.			576	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 00:25:53 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 43.50.104.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 43.50.104.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.185.229.83 attackspam
Honeypot attack, port: 23, PTR: 46.185.x.83.go.com.jo.
2019-09-16 19:49:10
1.173.105.21 attack
Honeypot attack, port: 23, PTR: 1-173-105-21.dynamic-ip.hinet.net.
2019-09-16 19:42:49
35.187.68.190 attackbotsspam
Honeypot attack, port: 445, PTR: 190.68.187.35.bc.googleusercontent.com.
2019-09-16 19:52:04
2.56.214.154 attackbotsspam
Sep 16 09:58:39 zn006 sshd[12260]: Address 2.56.214.154 maps to no-reveeclipse-yet.local, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Sep 16 09:58:39 zn006 sshd[12260]: Invalid user unseen from 2.56.214.154
Sep 16 09:58:39 zn006 sshd[12260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.56.214.154 
Sep 16 09:58:41 zn006 sshd[12260]: Failed password for invalid user unseen from 2.56.214.154 port 52144 ssh2
Sep 16 09:58:41 zn006 sshd[12260]: Received disconnect from 2.56.214.154: 11: Bye Bye [preauth]
Sep 16 10:08:40 zn006 sshd[13282]: Address 2.56.214.154 maps to no-reveeclipse-yet.local, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Sep 16 10:08:40 zn006 sshd[13282]: Invalid user fax from 2.56.214.154
Sep 16 10:08:40 zn006 sshd[13282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.56.214.154 
Sep 16 10:08:42 zn006 sshd[13282]: Faile........
-------------------------------
2019-09-16 20:03:56
51.75.248.241 attackbotsspam
Sep 16 01:31:57 sachi sshd\[15061\]: Invalid user admin from 51.75.248.241
Sep 16 01:31:57 sachi sshd\[15061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=241.ip-51-75-248.eu
Sep 16 01:31:59 sachi sshd\[15061\]: Failed password for invalid user admin from 51.75.248.241 port 49108 ssh2
Sep 16 01:35:59 sachi sshd\[15369\]: Invalid user socket from 51.75.248.241
Sep 16 01:35:59 sachi sshd\[15369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=241.ip-51-75-248.eu
2019-09-16 19:42:17
152.169.204.74 attackbotsspam
Sep 16 11:37:17 hcbbdb sshd\[16628\]: Invalid user supervisor from 152.169.204.74
Sep 16 11:37:17 hcbbdb sshd\[16628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.169.204.74
Sep 16 11:37:19 hcbbdb sshd\[16628\]: Failed password for invalid user supervisor from 152.169.204.74 port 58849 ssh2
Sep 16 11:43:04 hcbbdb sshd\[17233\]: Invalid user nong from 152.169.204.74
Sep 16 11:43:04 hcbbdb sshd\[17233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.169.204.74
2019-09-16 19:50:59
110.138.150.222 attackspambots
Honeypot attack, port: 445, PTR: 222.subnet110-138-150.speedy.telkom.net.id.
2019-09-16 20:21:34
37.49.230.31 attackbotsspam
scan z
2019-09-16 19:54:02
159.65.198.48 attack
Automated report - ssh fail2ban:
Sep 16 13:39:32 authentication failure 
Sep 16 13:39:34 wrong password, user=dexter, port=46782, ssh2
Sep 16 13:43:35 authentication failure
2019-09-16 19:45:14
134.209.198.213 attack
Sep 16 13:52:19 plex sshd[26962]: Invalid user kevin from 134.209.198.213 port 38972
2019-09-16 19:54:27
192.227.252.2 attackspambots
Sep 16 08:07:01 TORMINT sshd\[30901\]: Invalid user niao from 192.227.252.2
Sep 16 08:07:01 TORMINT sshd\[30901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.252.2
Sep 16 08:07:03 TORMINT sshd\[30901\]: Failed password for invalid user niao from 192.227.252.2 port 42478 ssh2
...
2019-09-16 20:17:56
68.183.133.21 attack
Sep 16 14:14:11 rpi sshd[4840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.133.21 
Sep 16 14:14:13 rpi sshd[4840]: Failed password for invalid user paco from 68.183.133.21 port 50284 ssh2
2019-09-16 20:18:33
171.224.32.196 attack
Sep 16 10:25:51 dev sshd\[20884\]: Invalid user admin from 171.224.32.196 port 56921
Sep 16 10:25:51 dev sshd\[20884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.224.32.196
Sep 16 10:25:54 dev sshd\[20884\]: Failed password for invalid user admin from 171.224.32.196 port 56921 ssh2
2019-09-16 20:07:10
183.130.91.106 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-09-16 20:04:50
115.213.141.28 attackspam
Sep 16 10:26:00 ubuntu-2gb-fsn1-1 sshd[14287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.213.141.28
Sep 16 10:26:02 ubuntu-2gb-fsn1-1 sshd[14287]: Failed password for invalid user admin from 115.213.141.28 port 39939 ssh2
...
2019-09-16 20:02:20

Recently Reported IPs

114.104.20.237 114.105.151.247 114.105.194.19 114.105.52.148
114.105.83.181 114.105.83.184 114.105.83.186 114.105.83.19
114.105.83.190 114.105.83.194 114.105.83.196 114.105.83.200
114.105.83.203 114.105.83.205 114.105.83.213 114.105.83.23
114.105.83.246 114.105.83.254 114.105.83.26 188.170.79.249