Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Wilkinsburg

Region: Pennsylvania

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.50.105.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43246
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;48.50.105.34.			IN	A

;; AUTHORITY SECTION:
.			455	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110200 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 02 17:26:37 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 34.105.50.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.105.50.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
115.58.95.227 attackspambots
Jul 16 23:14:22 server sshd[6339]: Failed password for root from 115.58.95.227 port 50856 ssh2
...
2019-07-17 13:58:12
134.209.98.186 attack
2019-07-17T05:27:31.625857abusebot-5.cloudsearch.cf sshd\[1185\]: Invalid user centos from 134.209.98.186 port 48916
2019-07-17 14:01:25
201.210.225.107 attackspam
TCP port 445 (SMB) attempt blocked by firewall. [2019-07-16 22:58:06]
2019-07-17 14:05:50
46.101.204.20 attackbots
Jul 17 08:09:11 vps691689 sshd[12341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.204.20
Jul 17 08:09:13 vps691689 sshd[12341]: Failed password for invalid user pgsql from 46.101.204.20 port 36410 ssh2
Jul 17 08:14:59 vps691689 sshd[12396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.204.20
...
2019-07-17 14:19:32
120.132.105.173 attackspam
2019-07-17T07:54:36.349190cavecanem sshd[3387]: Invalid user nian from 120.132.105.173 port 51342
2019-07-17T07:54:36.351512cavecanem sshd[3387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.105.173
2019-07-17T07:54:36.349190cavecanem sshd[3387]: Invalid user nian from 120.132.105.173 port 51342
2019-07-17T07:54:37.997259cavecanem sshd[3387]: Failed password for invalid user nian from 120.132.105.173 port 51342 ssh2
2019-07-17T07:58:51.003333cavecanem sshd[8714]: Invalid user oracle from 120.132.105.173 port 59848
2019-07-17T07:58:51.005792cavecanem sshd[8714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.105.173
2019-07-17T07:58:51.003333cavecanem sshd[8714]: Invalid user oracle from 120.132.105.173 port 59848
2019-07-17T07:58:53.660294cavecanem sshd[8714]: Failed password for invalid user oracle from 120.132.105.173 port 59848 ssh2
2019-07-17T08:03:21.997833cavecanem sshd[14489]: Inv
...
2019-07-17 14:12:08
191.53.52.28 attackspam
failed_logins
2019-07-17 14:29:14
129.205.22.130 attack
Jul 17 01:01:38 askasleikir sshd[16038]: Failed password for invalid user admin from 129.205.22.130 port 55513 ssh2
2019-07-17 14:18:40
191.53.197.249 attackbotsspam
failed_logins
2019-07-17 14:40:01
66.249.79.253 attackbotsspam
Tried to access non-existent folder
2019-07-17 14:18:06
5.255.250.41 attackspambots
EventTime:Wed Jul 17 06:59:40 AEST 2019,Protocol:TCP,VendorEventCode:RT_FLOW_SESSION_DENY,TargetPort:443,SourceIP:5.255.250.41,SourcePort:36897
2019-07-17 14:03:21
211.228.17.147 attack
Jun 27 05:24:12 server sshd\[52843\]: Invalid user yuanwd from 211.228.17.147
Jun 27 05:24:12 server sshd\[52843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.228.17.147
Jun 27 05:24:13 server sshd\[52843\]: Failed password for invalid user yuanwd from 211.228.17.147 port 43903 ssh2
...
2019-07-17 14:04:36
177.125.164.225 attackbots
Jul 17 01:38:04 vps200512 sshd\[22275\]: Invalid user admin from 177.125.164.225
Jul 17 01:38:04 vps200512 sshd\[22275\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.125.164.225
Jul 17 01:38:06 vps200512 sshd\[22275\]: Failed password for invalid user admin from 177.125.164.225 port 57608 ssh2
Jul 17 01:44:15 vps200512 sshd\[22449\]: Invalid user zc from 177.125.164.225
Jul 17 01:44:15 vps200512 sshd\[22449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.125.164.225
2019-07-17 13:56:56
197.214.10.4 attackspam
Jul 17 09:14:21 srv-4 sshd\[3246\]: Invalid user admin from 197.214.10.4
Jul 17 09:14:21 srv-4 sshd\[3246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.214.10.4
Jul 17 09:14:23 srv-4 sshd\[3246\]: Failed password for invalid user admin from 197.214.10.4 port 4931 ssh2
...
2019-07-17 14:41:16
103.107.63.236 attack
Automatic report - Port Scan Attack
2019-07-17 14:34:57
95.59.58.184 attackspambots
Automatic report - Port Scan Attack
2019-07-17 14:39:34

Recently Reported IPs

79.0.15.84 96.203.137.139 113.178.34.186 48.250.153.148
112.81.134.174 242.248.8.204 206.212.201.132 69.69.83.195
147.145.64.92 185.86.10.200 61.73.52.51 228.189.134.128
208.13.212.219 64.238.222.212 204.13.228.1 7.37.59.90
194.11.202.106 28.4.16.109 43.76.176.246 234.64.64.18