Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 173.139.50.209
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65494
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;173.139.50.209.			IN	A

;; AUTHORITY SECTION:
.			8	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 02:19:16 CST 2022
;; MSG SIZE  rcvd: 107
Host info
209.50.139.173.in-addr.arpa domain name pointer ip-173-139-50-209.sanjca.spcsdns.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
209.50.139.173.in-addr.arpa	name = ip-173-139-50-209.sanjca.spcsdns.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
128.201.58.162 attack
Unauthorized connection attempt detected from IP address 128.201.58.162 to port 23 [J]
2020-02-04 04:34:07
46.229.168.139 attackspambots
REQUESTED PAGE: /javascript;;
2020-02-04 04:18:24
46.140.66.130 attackspam
Unauthorized connection attempt detected from IP address 46.140.66.130 to port 2220 [J]
2020-02-04 04:45:56
23.24.239.105 attack
Unauthorized connection attempt detected from IP address 23.24.239.105 to port 23 [J]
2020-02-04 04:48:12
122.51.116.103 attackbotsspam
Unauthorized connection attempt detected from IP address 122.51.116.103 to port 7001 [J]
2020-02-04 04:35:58
221.156.222.42 attackbots
Unauthorized connection attempt detected from IP address 221.156.222.42 to port 5555 [J]
2020-02-04 04:23:44
79.137.86.205 attackspambots
Feb  3 16:10:11 ws24vmsma01 sshd[21477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.86.205
Feb  3 16:10:13 ws24vmsma01 sshd[21477]: Failed password for invalid user b3 from 79.137.86.205 port 52342 ssh2
...
2020-02-04 04:16:02
27.109.133.181 attackbotsspam
Unauthorized connection attempt detected from IP address 27.109.133.181 to port 5555 [J]
2020-02-04 04:20:47
191.100.10.184 attack
Unauthorized connection attempt detected from IP address 191.100.10.184 to port 2004 [J]
2020-02-04 04:27:05
103.133.206.220 attackbotsspam
Unauthorized connection attempt detected from IP address 103.133.206.220 to port 8080 [J]
2020-02-04 04:39:20
191.53.71.87 attack
Unauthorized connection attempt detected from IP address 191.53.71.87 to port 8080 [J]
2020-02-04 04:53:09
139.199.89.157 attack
Unauthorized connection attempt detected from IP address 139.199.89.157 to port 2220 [J]
2020-02-04 04:33:24
188.170.13.225 attack
SSH_scan
2020-02-04 04:54:13
91.177.36.60 attackbots
Unauthorized connection attempt detected from IP address 91.177.36.60 to port 8081 [J]
2020-02-04 04:41:32
20.185.8.59 attackspam
Feb  1 01:17:54 v22018076590370373 sshd[47240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.185.8.59 
...
2020-02-04 04:48:42

Recently Reported IPs

186.27.228.30 227.72.79.118 42.83.36.129 190.203.206.71
231.63.202.124 127.149.196.77 157.191.237.114 157.79.205.41
119.228.76.60 236.32.40.16 114.153.13.112 12.236.220.5
247.219.91.159 201.26.111.66 59.81.100.116 181.137.91.201
195.99.132.148 230.144.62.234 66.91.93.62 223.173.76.99