Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 205.194.50.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23976
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;205.194.50.55.			IN	A

;; AUTHORITY SECTION:
.			40	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031600 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 16 20:43:43 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 55.50.194.205.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.50.194.205.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
124.156.103.155 attackbots
Jul 16 00:18:52 zooi sshd[10970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.103.155
Jul 16 00:18:53 zooi sshd[10970]: Failed password for invalid user cust from 124.156.103.155 port 53688 ssh2
...
2020-07-16 08:16:03
94.180.247.20 attackspambots
$f2bV_matches
2020-07-16 08:16:47
5.135.182.84 attack
Jul 16 03:54:02 lunarastro sshd[3000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.182.84 
Jul 16 03:54:03 lunarastro sshd[3000]: Failed password for invalid user postgres from 5.135.182.84 port 34116 ssh2
2020-07-16 07:56:35
141.98.10.37 attack
Brute forcing RDP port 3389
2020-07-16 08:03:50
52.227.170.114 attackbotsspam
Jul 16 01:43:39 odroid64 sshd\[15052\]: User root from 52.227.170.114 not allowed because not listed in AllowUsers
Jul 16 01:43:39 odroid64 sshd\[15052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.227.170.114  user=root
...
2020-07-16 08:05:57
193.112.74.169 attack
Jul 16 01:26:15 vpn01 sshd[31435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.74.169
Jul 16 01:26:17 vpn01 sshd[31435]: Failed password for invalid user nginx from 193.112.74.169 port 42708 ssh2
...
2020-07-16 07:59:33
51.77.144.50 attackspambots
Jul 16 01:06:18 jane sshd[15792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.144.50 
Jul 16 01:06:21 jane sshd[15792]: Failed password for invalid user lucas from 51.77.144.50 port 32916 ssh2
...
2020-07-16 08:06:23
52.188.124.75 attackbotsspam
Jul 16 02:15:22 db sshd[10828]: User root from 52.188.124.75 not allowed because none of user's groups are listed in AllowGroups
...
2020-07-16 08:19:42
52.227.173.224 attackbotsspam
Jul 15 18:39:54 ws24vmsma01 sshd[165615]: Failed password for root from 52.227.173.224 port 28794 ssh2
...
2020-07-16 08:04:44
192.241.234.173 attackspam
Port Scan
...
2020-07-16 08:18:01
52.231.162.132 attack
Jul 16 01:34:17 fhem-rasp sshd[6678]: Failed password for root from 52.231.162.132 port 10049 ssh2
Jul 16 01:34:19 fhem-rasp sshd[6678]: Disconnected from authenticating user root 52.231.162.132 port 10049 [preauth]
...
2020-07-16 07:55:15
52.188.200.88 attackspam
Scanned 3 times in the last 24 hours on port 22
2020-07-16 08:12:18
52.188.154.178 attack
Scanned 3 times in the last 24 hours on port 22
2020-07-16 08:17:16
37.187.21.81 attackbotsspam
Jul 16 01:34:29 OPSO sshd\[1105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.21.81  user=mysql
Jul 16 01:34:31 OPSO sshd\[1105\]: Failed password for mysql from 37.187.21.81 port 39897 ssh2
Jul 16 01:41:21 OPSO sshd\[2519\]: Invalid user ftpuser from 37.187.21.81 port 47215
Jul 16 01:41:21 OPSO sshd\[2519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.21.81
Jul 16 01:41:22 OPSO sshd\[2519\]: Failed password for invalid user ftpuser from 37.187.21.81 port 47215 ssh2
2020-07-16 07:57:34
52.230.7.48 attack
Jul 15 22:05:32 localhost sshd\[9918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.230.7.48  user=root
Jul 15 22:05:34 localhost sshd\[9918\]: Failed password for root from 52.230.7.48 port 20977 ssh2
Jul 15 22:44:31 localhost sshd\[10774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.230.7.48  user=root
...
2020-07-16 07:57:07

Recently Reported IPs

152.229.185.178 145.1.234.147 188.166.184.56 3.194.102.211
46.96.172.250 41.89.3.94 232.105.188.11 70.205.177.22
42.82.207.176 64.252.180.194 102.235.90.0 237.109.245.47
103.99.170.153 74.183.69.182 5.196.43.226 144.76.98.183
228.158.125.142 238.13.145.81 78.13.89.24 176.219.9.37