Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Susanville

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.120.5.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39491
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.120.5.204.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011300 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 13 15:51:12 CST 2025
;; MSG SIZE  rcvd: 105
Host info
204.5.120.50.in-addr.arpa domain name pointer 50-120-5-204.drr01.ekgv.ca.frontiernet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
204.5.120.50.in-addr.arpa	name = 50-120-5-204.drr01.ekgv.ca.frontiernet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
158.69.197.113 attack
Sep 15 06:04:51 www sshd\[46641\]: Invalid user celia from 158.69.197.113Sep 15 06:04:53 www sshd\[46641\]: Failed password for invalid user celia from 158.69.197.113 port 52886 ssh2Sep 15 06:08:51 www sshd\[46803\]: Invalid user sphinx from 158.69.197.113
...
2019-09-15 11:21:38
37.187.178.245 attackbotsspam
Sep 14 23:24:21 debian sshd\[27628\]: Invalid user webmaster from 37.187.178.245 port 49096
Sep 14 23:24:21 debian sshd\[27628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.178.245
Sep 14 23:24:22 debian sshd\[27628\]: Failed password for invalid user webmaster from 37.187.178.245 port 49096 ssh2
...
2019-09-15 11:24:30
186.10.17.84 attackbotsspam
Sep 14 17:32:04 web9 sshd\[20066\]: Invalid user mrtinluther from 186.10.17.84
Sep 14 17:32:04 web9 sshd\[20066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.10.17.84
Sep 14 17:32:06 web9 sshd\[20066\]: Failed password for invalid user mrtinluther from 186.10.17.84 port 41414 ssh2
Sep 14 17:36:49 web9 sshd\[20963\]: Invalid user ddddd from 186.10.17.84
Sep 14 17:36:49 web9 sshd\[20963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.10.17.84
2019-09-15 11:41:03
95.33.225.176 attackspam
Sep 15 06:37:14 tuotantolaitos sshd[1580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.33.225.176
Sep 15 06:37:16 tuotantolaitos sshd[1580]: Failed password for invalid user erp from 95.33.225.176 port 33252 ssh2
...
2019-09-15 11:38:28
142.93.212.131 attackbots
Sep 15 06:31:20 www sshd\[173090\]: Invalid user User from 142.93.212.131
Sep 15 06:31:20 www sshd\[173090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.131
Sep 15 06:31:22 www sshd\[173090\]: Failed password for invalid user User from 142.93.212.131 port 38240 ssh2
...
2019-09-15 11:32:08
177.63.210.93 attack
Automatic report - Port Scan Attack
2019-09-15 11:39:57
111.223.73.20 attack
Sep 15 05:09:00 MK-Soft-Root1 sshd\[9649\]: Invalid user insserver from 111.223.73.20 port 39282
Sep 15 05:09:00 MK-Soft-Root1 sshd\[9649\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.223.73.20
Sep 15 05:09:02 MK-Soft-Root1 sshd\[9649\]: Failed password for invalid user insserver from 111.223.73.20 port 39282 ssh2
...
2019-09-15 11:10:41
51.68.70.175 attackbotsspam
2019-09-15T03:08:52.892394abusebot-3.cloudsearch.cf sshd\[14230\]: Invalid user ts1 from 51.68.70.175 port 54230
2019-09-15 11:14:19
45.40.194.129 attackspambots
Sep 14 22:54:20 vps200512 sshd\[22720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.194.129  user=mysql
Sep 14 22:54:23 vps200512 sshd\[22720\]: Failed password for mysql from 45.40.194.129 port 33906 ssh2
Sep 14 22:59:14 vps200512 sshd\[22804\]: Invalid user apollo from 45.40.194.129
Sep 14 22:59:14 vps200512 sshd\[22804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.194.129
Sep 14 22:59:16 vps200512 sshd\[22804\]: Failed password for invalid user apollo from 45.40.194.129 port 47464 ssh2
2019-09-15 11:37:11
86.101.56.141 attackspam
Sep 14 17:12:43 php1 sshd\[24493\]: Invalid user gertruda from 86.101.56.141
Sep 14 17:12:43 php1 sshd\[24493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.101.56.141
Sep 14 17:12:45 php1 sshd\[24493\]: Failed password for invalid user gertruda from 86.101.56.141 port 50230 ssh2
Sep 14 17:17:10 php1 sshd\[24906\]: Invalid user redmine from 86.101.56.141
Sep 14 17:17:10 php1 sshd\[24906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.101.56.141
2019-09-15 11:17:22
209.97.167.131 attackspam
Sep 15 10:32:46 webhost01 sshd[8465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.167.131
Sep 15 10:32:48 webhost01 sshd[8465]: Failed password for invalid user nathalie from 209.97.167.131 port 51088 ssh2
...
2019-09-15 11:38:02
51.255.39.143 attackbotsspam
Sep 15 02:37:18 XXXXXX sshd[18656]: Invalid user po7dev from 51.255.39.143 port 56538
2019-09-15 11:06:17
46.135.224.255 attackspambots
Telnet Server BruteForce Attack
2019-09-15 11:28:05
128.199.142.138 attack
Sep 15 04:49:47 rotator sshd\[17537\]: Invalid user linux12345 from 128.199.142.138Sep 15 04:49:49 rotator sshd\[17537\]: Failed password for invalid user linux12345 from 128.199.142.138 port 58822 ssh2Sep 15 04:54:34 rotator sshd\[18305\]: Invalid user sysadmin123 from 128.199.142.138Sep 15 04:54:36 rotator sshd\[18305\]: Failed password for invalid user sysadmin123 from 128.199.142.138 port 43508 ssh2Sep 15 04:59:14 rotator sshd\[19081\]: Invalid user appuser123456 from 128.199.142.138Sep 15 04:59:16 rotator sshd\[19081\]: Failed password for invalid user appuser123456 from 128.199.142.138 port 56428 ssh2
...
2019-09-15 11:30:02
111.230.241.245 attackbotsspam
Sep 15 05:26:59 plex sshd[14294]: Invalid user dust from 111.230.241.245 port 60274
2019-09-15 11:30:49

Recently Reported IPs

62.132.46.149 130.100.196.43 70.24.116.145 253.72.100.27
85.37.218.177 111.90.50.4 121.6.242.6 127.139.207.60
63.75.186.188 131.140.57.220 169.164.92.213 49.216.234.148
52.214.13.23 13.145.147.178 90.77.121.215 2.66.0.6
97.142.218.96 189.111.231.210 53.222.169.158 201.190.83.77