Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.99.12.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34261
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;4.99.12.50.			IN	A

;; AUTHORITY SECTION:
.			372	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102901 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 30 06:09:28 CST 2019
;; MSG SIZE  rcvd: 114
Host info
Host 50.12.99.4.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.12.99.4.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.232 attack
(sshd) Failed SSH login from 112.85.42.232 (CN/China/-): 5 in the last 3600 secs
2019-10-27 00:20:50
2.136.131.36 attackspambots
2019-10-26T15:56:14.546982abusebot-5.cloudsearch.cf sshd\[20201\]: Invalid user deployer from 2.136.131.36 port 54952
2019-10-27 00:10:50
128.199.249.213 attackbotsspam
Tries to login WordPress (wp-login.php)
2019-10-27 00:04:13
176.235.136.107 attack
Unauthorized connection attempt from IP address 176.235.136.107 on Port 445(SMB)
2019-10-26 23:57:56
192.95.30.27 attackspam
Looking for resource vulnerabilities
2019-10-27 00:19:41
218.150.220.202 attack
Oct 26 18:22:36 vps647732 sshd[18887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.150.220.202
Oct 26 18:22:38 vps647732 sshd[18887]: Failed password for invalid user ny from 218.150.220.202 port 57570 ssh2
...
2019-10-27 00:31:47
47.90.62.250 attackspam
firewall-block, port(s): 445/tcp
2019-10-27 00:18:20
125.227.236.60 attackspambots
Oct 26 13:56:26 heissa sshd\[5143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125-227-236-60.hinet-ip.hinet.net  user=root
Oct 26 13:56:28 heissa sshd\[5143\]: Failed password for root from 125.227.236.60 port 59644 ssh2
Oct 26 14:00:42 heissa sshd\[5862\]: Invalid user ccapp from 125.227.236.60 port 42424
Oct 26 14:00:42 heissa sshd\[5862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125-227-236-60.hinet-ip.hinet.net
Oct 26 14:00:44 heissa sshd\[5862\]: Failed password for invalid user ccapp from 125.227.236.60 port 42424 ssh2
2019-10-26 23:56:40
61.63.182.249 attack
Unauthorized connection attempt from IP address 61.63.182.249 on Port 445(SMB)
2019-10-27 00:26:26
182.61.61.222 attack
Oct 26 13:50:55 legacy sshd[10544]: Failed password for root from 182.61.61.222 port 60638 ssh2
Oct 26 13:55:45 legacy sshd[10653]: Failed password for root from 182.61.61.222 port 39264 ssh2
...
2019-10-27 00:28:39
41.204.224.162 attack
Unauthorized connection attempt from IP address 41.204.224.162 on Port 445(SMB)
2019-10-27 00:06:53
42.115.91.254 attack
firewall-block, port(s): 8080/tcp
2019-10-27 00:21:27
49.234.28.54 attackspambots
$f2bV_matches
2019-10-27 00:05:06
220.76.107.50 attack
SSH Brute Force, server-1 sshd[8839]: Failed password for invalid user stream123 from 220.76.107.50 port 41866 ssh2
2019-10-27 00:31:33
139.59.79.56 attackspambots
SSH Brute-Force reported by Fail2Ban
2019-10-27 00:43:26

Recently Reported IPs

75.128.207.219 69.88.90.46 237.6.23.126 51.192.151.213
198.27.80.220 180.33.244.157 211.244.57.1 103.219.112.1
176.163.18.224 99.197.166.85 42.125.110.132 130.137.203.130
165.38.232.197 200.248.169.89 238.14.238.128 164.197.158.60
64.25.75.229 183.214.7.34 176.52.33.186 238.90.66.157