Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.104.245.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64366
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.104.245.8.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 14:02:52 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 8.245.104.50.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 8.245.104.50.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.225.166.63 attackbots
(sshd) Failed SSH login from 187.225.166.63 (MX/Mexico/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 22 07:53:10 server2 sshd[10854]: Invalid user cisco from 187.225.166.63
Sep 22 07:53:10 server2 sshd[10854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.225.166.63 
Sep 22 07:53:12 server2 sshd[10854]: Failed password for invalid user cisco from 187.225.166.63 port 33736 ssh2
Sep 22 08:00:51 server2 sshd[20236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.225.166.63  user=root
Sep 22 08:00:53 server2 sshd[20236]: Failed password for root from 187.225.166.63 port 51800 ssh2
2020-09-22 20:54:05
134.209.254.62 attack
DATE:2020-09-22 14:46:52, IP:134.209.254.62, PORT:ssh SSH brute force auth (docker-dc)
2020-09-22 20:55:23
36.133.109.2 attackbots
Sep 22 09:01:38 marvibiene sshd[41676]: Invalid user erika from 36.133.109.2 port 39794
Sep 22 09:01:38 marvibiene sshd[41676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.133.109.2
Sep 22 09:01:38 marvibiene sshd[41676]: Invalid user erika from 36.133.109.2 port 39794
Sep 22 09:01:40 marvibiene sshd[41676]: Failed password for invalid user erika from 36.133.109.2 port 39794 ssh2
2020-09-22 20:44:15
198.44.215.159 attack
Port 22 Scan, PTR: None
2020-09-22 21:04:01
212.70.149.20 attackbotsspam
Sep 22 01:06:15 web02.agentur-b-2.de postfix/smtpd[1717140]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 22 01:06:40 web02.agentur-b-2.de postfix/smtpd[1717140]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 22 01:07:04 web02.agentur-b-2.de postfix/smtpd[1717140]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 22 01:07:29 web02.agentur-b-2.de postfix/smtpd[1717140]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 22 01:07:53 web02.agentur-b-2.de postfix/smtpd[1717140]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-09-22 20:38:52
151.80.34.123 attack
Invalid user test from 151.80.34.123 port 33888
2020-09-22 20:31:00
178.62.50.192 attack
Failed password for invalid user alexis from 178.62.50.192 port 32966 ssh2
2020-09-22 20:56:19
186.234.80.10 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-09-22 21:01:21
51.83.132.89 attackspam
Auto Fail2Ban report, multiple SSH login attempts.
2020-09-22 21:00:58
124.156.63.188 attackbotsspam
TCP ports : 1666 / 7145; UDP port : 32766
2020-09-22 20:27:35
188.166.150.17 attack
2020-09-22T13:32:24.343550cyberdyne sshd[315280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.150.17
2020-09-22T13:32:24.337414cyberdyne sshd[315280]: Invalid user ftpuser from 188.166.150.17 port 59429
2020-09-22T13:32:26.618556cyberdyne sshd[315280]: Failed password for invalid user ftpuser from 188.166.150.17 port 59429 ssh2
2020-09-22T13:35:54.246292cyberdyne sshd[316089]: Invalid user cron from 188.166.150.17 port 35226
...
2020-09-22 21:05:41
149.56.13.111 attack
Sep 22 13:10:04 sip sshd[1692585]: Failed password for invalid user mcserver from 149.56.13.111 port 39281 ssh2
Sep 22 13:14:06 sip sshd[1692654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.13.111  user=root
Sep 22 13:14:08 sip sshd[1692654]: Failed password for root from 149.56.13.111 port 44683 ssh2
...
2020-09-22 20:45:20
49.231.166.197 attack
prod8
...
2020-09-22 20:28:05
94.21.93.44 attackspambots
94.21.93.44 (HU/Hungary/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 22 08:46:26 jbs1 sshd[6737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.169.214.217  user=root
Sep 22 08:44:30 jbs1 sshd[4582]: Failed password for root from 94.21.93.44 port 54473 ssh2
Sep 22 08:44:17 jbs1 sshd[4391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.71.145.189  user=root
Sep 22 08:44:19 jbs1 sshd[4391]: Failed password for root from 120.71.145.189 port 59136 ssh2
Sep 22 08:46:29 jbs1 sshd[6737]: Failed password for root from 95.169.214.217 port 55436 ssh2
Sep 22 08:47:47 jbs1 sshd[8178]: Failed password for root from 193.107.91.24 port 53904 ssh2

IP Addresses Blocked:

95.169.214.217 (BG/Bulgaria/-)
2020-09-22 21:00:42
177.22.84.5 attackbotsspam
Sep 22 08:02:51 vps639187 sshd\[16849\]: Invalid user admin from 177.22.84.5 port 55030
Sep 22 08:02:51 vps639187 sshd\[16849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.22.84.5
Sep 22 08:02:53 vps639187 sshd\[16849\]: Failed password for invalid user admin from 177.22.84.5 port 55030 ssh2
...
2020-09-22 20:48:51

Recently Reported IPs

203.247.211.39 197.236.151.51 220.156.131.182 207.114.13.19
69.82.12.152 230.238.171.231 171.82.0.63 167.72.36.38
7.111.167.230 192.137.221.224 57.44.7.186 194.111.224.146
32.255.119.125 107.71.30.127 65.87.7.97 147.161.187.20
106.77.66.112 254.91.73.148 93.134.235.116 119.160.198.20