Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Riyadh

Region: Ar Riyāḑ

Country: Saudi Arabia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.119.223.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22235
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;50.119.223.66.			IN	A

;; AUTHORITY SECTION:
.			241	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020033102 1800 900 604800 86400

;; Query time: 94 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 19:09:54 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 66.223.119.50.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.223.119.50.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
212.64.11.64 attackspambots
Jan 23 03:00:42 ms-srv sshd[7607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.11.64
Jan 23 03:00:44 ms-srv sshd[7607]: Failed password for invalid user ey from 212.64.11.64 port 46526 ssh2
2020-02-15 22:01:49
119.29.246.210 attack
Feb 15 09:31:19 silence02 sshd[21086]: Failed password for root from 119.29.246.210 port 55426 ssh2
Feb 15 09:34:04 silence02 sshd[21219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.246.210
Feb 15 09:34:06 silence02 sshd[21219]: Failed password for invalid user nagios from 119.29.246.210 port 43106 ssh2
2020-02-15 21:43:31
162.243.129.233 attack
" "
2020-02-15 21:47:58
222.186.175.150 attackspam
Feb 15 15:00:55 vpn01 sshd[8250]: Failed password for root from 222.186.175.150 port 46412 ssh2
Feb 15 15:00:58 vpn01 sshd[8250]: Failed password for root from 222.186.175.150 port 46412 ssh2
...
2020-02-15 22:18:06
180.176.74.178 attackspam
SS5,WP GET /wp-login.php
2020-02-15 21:52:55
118.43.4.238 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 22:28:49
14.169.94.86 attackbotsspam
1581741931 - 02/15/2020 05:45:31 Host: 14.169.94.86/14.169.94.86 Port: 445 TCP Blocked
2020-02-15 21:48:56
81.214.245.41 attackbots
Automatic report - Port Scan Attack
2020-02-15 21:42:33
222.186.180.142 attackbotsspam
Feb  2 11:08:42 ms-srv sshd[49077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.142  user=root
Feb  2 11:08:44 ms-srv sshd[49077]: Failed password for invalid user root from 222.186.180.142 port 32063 ssh2
2020-02-15 22:25:16
23.94.22.131 attackspam
scan r
2020-02-15 21:52:17
118.233.171.106 attackbots
20/2/15@08:54:05: FAIL: IoT-Telnet address from=118.233.171.106
...
2020-02-15 22:06:12
212.64.23.30 attackspam
Nov 30 09:51:26 ms-srv sshd[4988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.23.30
Nov 30 09:51:28 ms-srv sshd[4988]: Failed password for invalid user peralez from 212.64.23.30 port 51034 ssh2
2020-02-15 21:56:39
118.43.60.214 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 22:22:42
68.116.41.6 attackspambots
2020-02-15T08:37:45.7158381495-001 sshd[37807]: Invalid user administration1234 from 68.116.41.6 port 44558
2020-02-15T08:37:45.7190121495-001 sshd[37807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68-116-41-6.static.mdfd.or.charter.com
2020-02-15T08:37:45.7158381495-001 sshd[37807]: Invalid user administration1234 from 68.116.41.6 port 44558
2020-02-15T08:37:47.8169101495-001 sshd[37807]: Failed password for invalid user administration1234 from 68.116.41.6 port 44558 ssh2
2020-02-15T08:39:09.6570741495-001 sshd[37885]: Invalid user GLsp1$foo!AMG from 68.116.41.6 port 57826
2020-02-15T08:39:09.6602671495-001 sshd[37885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68-116-41-6.static.mdfd.or.charter.com
2020-02-15T08:39:09.6570741495-001 sshd[37885]: Invalid user GLsp1$foo!AMG from 68.116.41.6 port 57826
2020-02-15T08:39:11.6230151495-001 sshd[37885]: Failed password for invalid user GLsp1$foo!AMG 
...
2020-02-15 22:00:06
185.143.223.97 attack
Feb 15 14:54:19 grey postfix/smtpd\[12120\]: NOQUEUE: reject: RCPT from unknown\[185.143.223.97\]: 554 5.7.1 Service unavailable\; Client host \[185.143.223.97\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[185.143.223.97\]\; from=\<1fpj84fuh25d2wo@aviakargoline.ru\> to=\ proto=ESMTP helo=\<\[185.143.223.97\]\>Feb 15 14:54:19 grey postfix/smtpd\[12120\]: NOQUEUE: reject: RCPT from unknown\[185.143.223.97\]: 554 5.7.1 Service unavailable\; Client host \[185.143.223.97\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[185.143.223.97\]\; from=\<1fpj84fuh25d2wo@aviakargoline.ru\> to=\ proto=ESMTP helo=\<\[185.143.223.97\]\>Feb 15 14:54:19 grey postfix/smtpd\[12120\]: NOQUEUE: reject: RCPT from unknown\[185.143.223.97\]: 554 5.7.1 Service unavailable\; Client host \[185.143.223.97\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[185.143.223.97\]\; from=\<1fpj84fuh25
...
2020-02-15 22:11:48

Recently Reported IPs

204.49.159.89 136.86.107.19 61.80.206.141 97.146.117.188
12.249.82.251 15.128.211.253 202.139.192.23 45.248.100.2
67.239.118.77 4.232.96.159 99.48.37.221 108.101.157.67
118.168.122.222 11.72.215.9 102.126.242.14 187.56.47.146
112.175.107.223 75.43.32.18 214.8.76.32 110.231.140.79