Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.208.55.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44570
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.208.55.50.			IN	A

;; AUTHORITY SECTION:
.			359	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 19:01:09 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 50.55.208.116.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.55.208.116.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.59.41.154 attack
$f2bV_matches
2020-03-08 06:21:15
187.135.153.160 attack
Port probing on unauthorized port 445
2020-03-08 06:06:04
222.186.173.238 attackbotsspam
Mar  7 23:10:40 MK-Soft-Root2 sshd[7017]: Failed password for root from 222.186.173.238 port 7322 ssh2
Mar  7 23:10:45 MK-Soft-Root2 sshd[7017]: Failed password for root from 222.186.173.238 port 7322 ssh2
...
2020-03-08 06:14:24
220.135.71.77 attack
port scan and connect, tcp 1433 (ms-sql-s)
2020-03-08 06:22:19
181.30.28.247 attackspam
Mar  7 23:10:40 v22018076622670303 sshd\[26295\]: Invalid user 123g from 181.30.28.247 port 51892
Mar  7 23:10:40 v22018076622670303 sshd\[26295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.28.247
Mar  7 23:10:42 v22018076622670303 sshd\[26295\]: Failed password for invalid user 123g from 181.30.28.247 port 51892 ssh2
...
2020-03-08 06:16:08
45.146.202.28 attack
Mar  7 14:22:56 mail.srvfarm.net postfix/smtpd[2759319]: NOQUEUE: reject: RCPT from unknown[45.146.202.28]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  7 14:22:56 mail.srvfarm.net postfix/smtpd[2776400]: NOQUEUE: reject: RCPT from unknown[45.146.202.28]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  7 14:22:56 mail.srvfarm.net postfix/smtpd[2760273]: NOQUEUE: reject: RCPT from unknown[45.146.202.28]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  7 14:22:56 mail.srvfarm.net postfix/smtpd[2762158]: NOQUEUE: reject: RCPT from unknown[45.146.202.28]: 450 4.1.8 
2020-03-08 05:56:50
175.139.176.117 attackbotsspam
Mar  7 22:35:12 v22018076622670303 sshd\[25927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.176.117  user=root
Mar  7 22:35:13 v22018076622670303 sshd\[25927\]: Failed password for root from 175.139.176.117 port 41972 ssh2
Mar  7 22:43:34 v22018076622670303 sshd\[26023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.176.117  user=root
...
2020-03-08 05:49:09
203.93.97.101 attackspambots
Mar  7 23:07:57 minden010 sshd[10948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.93.97.101
Mar  7 23:08:00 minden010 sshd[10948]: Failed password for invalid user git from 203.93.97.101 port 42917 ssh2
Mar  7 23:10:55 minden010 sshd[11998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.93.97.101
...
2020-03-08 06:11:00
45.95.168.111 attack
suspicious action Sat, 07 Mar 2020 18:00:39 -0300
2020-03-08 05:58:09
177.99.10.102 attackspambots
Honeypot attack, port: 445, PTR: 177.99.10.dynamic.adsl.gvt.net.br.
2020-03-08 06:05:07
220.135.40.78 attackbots
firewall-block, port(s): 81/tcp
2020-03-08 06:26:48
45.55.80.186 attackbotsspam
Mar  7 20:54:55 vps647732 sshd[22174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.80.186
Mar  7 20:54:57 vps647732 sshd[22174]: Failed password for invalid user rajesh from 45.55.80.186 port 35384 ssh2
...
2020-03-08 05:53:45
41.160.28.66 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-08 06:18:27
222.186.180.17 attackbotsspam
Mar  7 23:15:44 vps647732 sshd[25471]: Failed password for root from 222.186.180.17 port 44088 ssh2
Mar  7 23:15:56 vps647732 sshd[25471]: error: maximum authentication attempts exceeded for root from 222.186.180.17 port 44088 ssh2 [preauth]
...
2020-03-08 06:20:34
51.77.156.223 attack
(sshd) Failed SSH login from 51.77.156.223 (FR/France/223.ip-51-77-156.eu): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar  7 20:03:18 ubnt-55d23 sshd[19399]: Invalid user testuser from 51.77.156.223 port 40738
Mar  7 20:03:19 ubnt-55d23 sshd[19399]: Failed password for invalid user testuser from 51.77.156.223 port 40738 ssh2
2020-03-08 05:51:22

Recently Reported IPs

116.208.55.62 116.208.55.71 114.105.183.74 114.105.183.79
114.105.183.80 114.105.183.86 114.105.183.89 114.105.183.9
116.208.97.26 116.208.97.64 116.208.97.29 116.208.97.61
116.208.97.95 116.208.97.53 116.208.97.246 116.208.97.33
116.208.98.11 116.208.97.62 225.35.159.71 116.208.97.92