Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 204.0.50.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39582
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;204.0.50.132.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025061300 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 13 14:28:19 CST 2025
;; MSG SIZE  rcvd: 105
Host info
132.50.0.204.in-addr.arpa domain name pointer host132.canteyhanger.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.50.0.204.in-addr.arpa	name = host132.canteyhanger.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
201.221.15.236 attackspam
Unauthorized connection attempt detected from IP address 201.221.15.236 to port 85 [J]
2020-01-06 01:43:19
187.214.142.68 attack
Unauthorized connection attempt detected from IP address 187.214.142.68 to port 8080
2020-01-06 02:17:21
173.16.89.70 attack
Unauthorized connection attempt detected from IP address 173.16.89.70 to port 5555 [J]
2020-01-06 01:55:17
124.156.54.190 attack
Unauthorized connection attempt detected from IP address 124.156.54.190 to port 3790 [J]
2020-01-06 01:57:17
187.178.243.209 attackspam
Unauthorized connection attempt detected from IP address 187.178.243.209 to port 23
2020-01-06 02:17:44
175.198.131.99 attack
Unauthorized connection attempt detected from IP address 175.198.131.99 to port 88
2020-01-06 02:22:19
188.211.80.160 attack
Unauthorized connection attempt detected from IP address 188.211.80.160 to port 80 [J]
2020-01-06 01:53:20
104.42.234.123 attackspam
Unauthorized connection attempt detected from IP address 104.42.234.123 to port 7001 [J]
2020-01-06 01:58:43
5.116.105.144 attackspambots
Unauthorized connection attempt detected from IP address 5.116.105.144 to port 445
2020-01-06 02:12:12
80.182.61.223 attackspambots
Unauthorized connection attempt detected from IP address 80.182.61.223 to port 4567 [J]
2020-01-06 02:02:24
78.188.223.2 attack
Unauthorized connection attempt detected from IP address 78.188.223.2 to port 8000 [J]
2020-01-06 02:04:10
41.235.59.160 attack
Unauthorized connection attempt detected from IP address 41.235.59.160 to port 22
2020-01-06 02:07:00
73.55.175.138 attackspam
Unauthorized connection attempt detected from IP address 73.55.175.138 to port 23 [J]
2020-01-06 02:05:23
37.183.37.41 attackspambots
Unauthorized connection attempt detected from IP address 37.183.37.41 to port 8080 [J]
2020-01-06 02:10:37
122.114.75.90 attackbotsspam
Jan  5 16:45:27 master sshd[23117]: Failed password for invalid user hadoop from 122.114.75.90 port 52232 ssh2
2020-01-06 02:24:43

Recently Reported IPs

14.155.228.67 204.0.50.133 204.0.50.136 198.235.24.117
153.35.178.171 fe80::3671:46ff:fede:4994 43.135.142.7 20.65.185.255
144.172.104.31 165.65.139.114 154.7.181.31 104.234.115.200
65.49.1.185 44.156.116.136 10.50.0.51 91.202.233.4
212.71.252.56 144.172.103.162 192.168.137.233 192.168.137.88