Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Carlsbad

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Charter Communications Inc

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.113.83.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6118
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;50.113.83.107.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 13 15:23:34 CST 2019
;; MSG SIZE  rcvd: 117

Host info
107.83.113.50.in-addr.arpa domain name pointer cpe-50-113-83-107.san.res.rr.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
107.83.113.50.in-addr.arpa	name = cpe-50-113-83-107.san.res.rr.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
104.41.59.240 attackspam
Brute-force attempt banned
2020-06-29 05:03:38
148.244.240.231 attackbots
Unauthorized connection attempt detected from IP address 148.244.240.231 to port 445
2020-06-29 04:39:27
125.165.63.161 attackspam
Invalid user admin from 125.165.63.161 port 57133
2020-06-29 05:09:53
197.156.65.138 attackbots
Jun 28 23:34:52 journals sshd\[33069\]: Invalid user ftphome from 197.156.65.138
Jun 28 23:34:52 journals sshd\[33069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.156.65.138
Jun 28 23:34:55 journals sshd\[33069\]: Failed password for invalid user ftphome from 197.156.65.138 port 53384 ssh2
Jun 28 23:38:59 journals sshd\[33411\]: Invalid user xwj from 197.156.65.138
Jun 28 23:38:59 journals sshd\[33411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.156.65.138
...
2020-06-29 04:43:53
188.254.0.2 attackspam
Jun 28 20:38:55 IngegnereFirenze sshd[28827]: Failed password for invalid user admin from 188.254.0.2 port 44616 ssh2
...
2020-06-29 04:50:20
115.233.218.204 attackbots
Jun 12 11:00:46 mail postfix/postscreen[30662]: DNSBL rank 3 for [115.233.218.204]:53611
...
2020-06-29 04:52:35
170.106.36.97 attackbots
Unauthorized connection attempt detected from IP address 170.106.36.97 to port 5902
2020-06-29 04:39:03
222.186.180.41 attackbots
Failed password for invalid user from 222.186.180.41 port 50504 ssh2
2020-06-29 05:06:09
191.30.107.106 attackbots
Unauthorized connection attempt detected from IP address 191.30.107.106 to port 23
2020-06-29 04:35:26
125.124.206.129 attack
SSH brute-force attempt
2020-06-29 05:16:00
104.244.76.189 attackspam
Jun 27 20:10:02 mail sshd[24598]: Failed password for sshd from 104.244.76.189 port 38776 ssh2
Jun 27 20:10:05 mail sshd[24598]: Failed password for sshd from 104.244.76.189 port 38776 ssh2
Jun 27 20:10:10 mail sshd[24598]: Failed password for sshd from 104.244.76.189 port 38776 ssh2
...
2020-06-29 04:49:14
138.99.216.112 attack
Jun 16 01:36:26 mail postfix/postscreen[14633]: DNSBL rank 3 for [138.99.216.112]:61000
...
2020-06-29 04:47:49
122.51.227.65 attackbotsspam
2020-06-29T03:38:37.906903hostname sshd[127734]: Invalid user zhaohao from 122.51.227.65 port 52682
...
2020-06-29 05:12:41
141.98.81.210 attackspam
Jun 28 20:42:24 *** sshd[23557]: Invalid user admin from 141.98.81.210
2020-06-29 05:15:33
156.96.116.248 attackbots
Jun 19 00:06:24 mail postfix/postscreen[6197]: DNSBL rank 3 for [156.96.116.248]:65368
...
2020-06-29 04:42:01

Recently Reported IPs

235.4.10.160 253.95.172.88 84.162.101.220 202.38.162.103
113.96.73.140 79.140.156.157 90.120.201.22 187.115.154.74
217.74.209.157 63.137.99.22 41.140.154.242 89.232.113.45
138.68.167.64 125.128.53.186 82.67.3.174 60.233.222.107
2.91.142.93 5.135.205.3 42.25.183.205 35.249.33.199