Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bensenville

Region: Illinois

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.21.50.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62228
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;216.21.50.68.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020012501 1800 900 604800 86400

;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 03:48:18 CST 2020
;; MSG SIZE  rcvd: 116
Host info
68.50.21.216.in-addr.arpa domain name pointer 68.50.21.216.biz.sta.networkgci.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.50.21.216.in-addr.arpa	name = 68.50.21.216.biz.sta.networkgci.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
52.47.177.142 attackspambots
[FriJan3121:39:24.2165312020][:error][pid12190:tid47392810362624][client52.47.177.142:58302][client52.47.177.142]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:\\\\\\\\b\(\?:\\\\\\\\.\(\?:ht\(\?:access\|passwd\|group\)\|www_\?acl\)\|global\\\\\\\\.asa\|httpd\\\\\\\\.conf\|boot\\\\\\\\.ini\|web.config\)\\\\\\\\b\|\(\|\^\|\\\\\\\\.\\\\\\\\.\)/etc/\|/\\\\\\\\.\(\?:history\|bash_history\|sh_history\|env\)\$\)"atREQUEST_FILENAME.[file"/usr/local/apache.ea3/conf/modsec_rules/10_asl_rules.conf"][line"211"][id"390709"][rev"30"][msg"Atomicorp.comWAFRules:Attempttoaccessprotectedfileremotely"][data"/.env"][severity"CRITICAL"][hostname"falegnameriamanea.ch"][uri"/.env"][unique_id"XjSQfBZ2LVVmbSpBd99lywAAABg"][FriJan3122:30:39.3131062020][:error][pid12204:tid47392770438912][client52.47.177.142:52310][client52.47.177.142]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:\\\\\\\\b\(\?:\\\\\\\\.\(\?:ht\(\?:access\|passwd\|group\)\|www_\?acl\)\|global\\\\\\\\.asa\|httpd\\
2020-02-01 10:29:25
18.197.100.150 attackbotsspam
[FriJan3122:30:40.3758352020][:error][pid12190:tid47392770438912][client18.197.100.150:51104][client18.197.100.150]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:\\\\\\\\b\(\?:\\\\\\\\.\(\?:ht\(\?:access\|passwd\|group\)\|www_\?acl\)\|global\\\\\\\\.asa\|httpd\\\\\\\\.conf\|boot\\\\\\\\.ini\|web.config\)\\\\\\\\b\|\(\|\^\|\\\\\\\\.\\\\\\\\.\)/etc/\|/\\\\\\\\.\(\?:history\|bash_history\|sh_history\|env\)\$\)"atREQUEST_FILENAME.[file"/usr/local/apache.ea3/conf/modsec_rules/10_asl_rules.conf"][line"211"][id"390709"][rev"30"][msg"Atomicorp.comWAFRules:Attempttoaccessprotectedfileremotely"][data"/.env"][severity"CRITICAL"][hostname"staufferpittura.ch"][uri"/.env"][unique_id"XjScgBZ2LVVmbSpBd99r6AAAAAU"][FriJan3122:30:43.5804162020][:error][pid12190:tid47392774641408][client18.197.100.150:45536][client18.197.100.150]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:\\\\\\\\b\(\?:\\\\\\\\.\(\?:ht\(\?:access\|passwd\|group\)\|www_\?acl\)\|global\\\\\\\\.asa\|httpd
2020-02-01 10:24:09
222.186.31.83 attackspam
Jan 31 23:16:41 firewall sshd[20307]: Failed password for root from 222.186.31.83 port 19275 ssh2
Jan 31 23:16:43 firewall sshd[20307]: Failed password for root from 222.186.31.83 port 19275 ssh2
Jan 31 23:16:46 firewall sshd[20307]: Failed password for root from 222.186.31.83 port 19275 ssh2
...
2020-02-01 10:26:37
183.47.45.226 attackbotsspam
Helo
2020-02-01 10:08:10
157.230.113.218 attack
$f2bV_matches
2020-02-01 10:40:16
167.99.131.243 attack
Unauthorized connection attempt detected from IP address 167.99.131.243 to port 2220 [J]
2020-02-01 10:05:40
14.99.4.26 attackspambots
Unauthorized connection attempt from IP address 14.99.4.26 on Port 445(SMB)
2020-02-01 10:36:39
222.186.52.139 attack
Unauthorized connection attempt detected from IP address 222.186.52.139 to port 22 [J]
2020-02-01 10:17:35
90.102.1.57 attackspambots
Unauthorized connection attempt from IP address 90.102.1.57 on Port 445(SMB)
2020-02-01 10:30:30
143.159.219.72 attackspambots
detected by Fail2Ban
2020-02-01 10:21:43
195.154.28.136 attackspam
$f2bV_matches
2020-02-01 10:19:22
80.82.65.122 attack
Feb  1 03:31:20 debian-2gb-nbg1-2 kernel: \[2783538.076236\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.65.122 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=19946 PROTO=TCP SPT=52254 DPT=18586 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-01 10:36:16
91.173.121.137 attack
(sshd) Failed SSH login from 91.173.121.137 (FR/France/91-173-121-137.subs.proxad.net): 5 in the last 3600 secs
2020-02-01 10:17:03
169.1.252.192 attack
Automatic report - Port Scan Attack
2020-02-01 10:34:50
49.235.161.202 attackspam
Feb  1 04:09:59 ncomp sshd[377]: Invalid user dev from 49.235.161.202
Feb  1 04:09:59 ncomp sshd[377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.161.202
Feb  1 04:09:59 ncomp sshd[377]: Invalid user dev from 49.235.161.202
Feb  1 04:10:01 ncomp sshd[377]: Failed password for invalid user dev from 49.235.161.202 port 44332 ssh2
2020-02-01 10:38:12

Recently Reported IPs

100.185.51.0 24.247.78.169 68.76.144.151 115.236.44.104
119.207.195.52 117.37.56.11 118.169.247.26 58.108.254.139
3.154.14.229 52.56.79.33 116.48.63.189 119.99.139.23
92.65.44.243 118.239.235.227 112.120.213.201 115.103.95.103
43.92.255.66 109.185.43.197 189.175.88.221 89.164.132.204