Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Frontier Communications of America, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.121.122.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55130
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;50.121.122.139.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071000 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jul 11 01:51:14 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 139.122.121.50.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 139.122.121.50.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
77.55.209.50 attack
$f2bV_matches
2020-04-28 12:56:22
222.186.180.6 attack
$f2bV_matches
2020-04-28 13:36:00
5.135.48.50 attackbotsspam
Apr 28 06:48:08 mout sshd[22713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.48.50  user=root
Apr 28 06:48:10 mout sshd[22713]: Failed password for root from 5.135.48.50 port 56784 ssh2
2020-04-28 13:21:49
37.152.177.25 attackspam
Apr 28 05:21:29 ip-172-31-62-245 sshd\[7100\]: Invalid user csg from 37.152.177.25\
Apr 28 05:21:32 ip-172-31-62-245 sshd\[7100\]: Failed password for invalid user csg from 37.152.177.25 port 50572 ssh2\
Apr 28 05:25:43 ip-172-31-62-245 sshd\[7149\]: Invalid user dm from 37.152.177.25\
Apr 28 05:25:45 ip-172-31-62-245 sshd\[7149\]: Failed password for invalid user dm from 37.152.177.25 port 33090 ssh2\
Apr 28 05:29:55 ip-172-31-62-245 sshd\[7176\]: Invalid user csgo2 from 37.152.177.25\
2020-04-28 13:35:26
64.227.72.66 attack
" "
2020-04-28 13:12:40
106.13.191.211 attack
Apr 28 05:31:42 ns382633 sshd\[1823\]: Invalid user nxf from 106.13.191.211 port 53942
Apr 28 05:31:42 ns382633 sshd\[1823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.191.211
Apr 28 05:31:44 ns382633 sshd\[1823\]: Failed password for invalid user nxf from 106.13.191.211 port 53942 ssh2
Apr 28 05:53:59 ns382633 sshd\[5749\]: Invalid user kpm from 106.13.191.211 port 56406
Apr 28 05:53:59 ns382633 sshd\[5749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.191.211
2020-04-28 13:03:12
222.174.213.178 attackspam
Invalid user chenwk from 222.174.213.178 port 30140
2020-04-28 13:31:09
104.131.46.166 attackspam
2020-04-28T04:07:54.043074homeassistant sshd[17549]: Invalid user steven from 104.131.46.166 port 40282
2020-04-28T04:07:54.052400homeassistant sshd[17549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.46.166
...
2020-04-28 13:19:39
91.83.93.220 attackspam
SpamScore above: 10.0
2020-04-28 13:20:54
122.160.76.68 attackspam
Apr 28 06:31:14 vps sshd[690895]: Failed password for invalid user weiguo from 122.160.76.68 port 54616 ssh2
Apr 28 06:35:39 vps sshd[715105]: Invalid user ansible from 122.160.76.68 port 57748
Apr 28 06:35:39 vps sshd[715105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.160.76.68
Apr 28 06:35:41 vps sshd[715105]: Failed password for invalid user ansible from 122.160.76.68 port 57748 ssh2
Apr 28 06:40:01 vps sshd[735708]: Invalid user hy from 122.160.76.68 port 60892
...
2020-04-28 12:57:08
103.84.194.244 attackspambots
Apr 28 06:45:17 OPSO sshd\[31805\]: Invalid user dewi from 103.84.194.244 port 36602
Apr 28 06:45:17 OPSO sshd\[31805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.84.194.244
Apr 28 06:45:19 OPSO sshd\[31805\]: Failed password for invalid user dewi from 103.84.194.244 port 36602 ssh2
Apr 28 06:53:18 OPSO sshd\[1922\]: Invalid user kt from 103.84.194.244 port 49314
Apr 28 06:53:18 OPSO sshd\[1922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.84.194.244
2020-04-28 13:07:00
198.143.158.178 attackspam
port scan and connect, tcp 443 (https)
2020-04-28 13:15:46
129.211.65.70 attackbotsspam
Apr 27 08:54:57 cloud sshd[30090]: Failed password for invalid user gus from 129.211.65.70 port 41758 ssh2
2020-04-28 13:03:43
118.27.24.127 attackspam
Apr 28 07:03:51 OPSO sshd\[6018\]: Invalid user mario from 118.27.24.127 port 59222
Apr 28 07:03:51 OPSO sshd\[6018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.24.127
Apr 28 07:03:53 OPSO sshd\[6018\]: Failed password for invalid user mario from 118.27.24.127 port 59222 ssh2
Apr 28 07:07:15 OPSO sshd\[7515\]: Invalid user info from 118.27.24.127 port 58150
Apr 28 07:07:15 OPSO sshd\[7515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.24.127
2020-04-28 13:37:52
218.92.0.212 attackbotsspam
Apr 28 04:46:49 sshgateway sshd\[4119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
Apr 28 04:46:51 sshgateway sshd\[4119\]: Failed password for root from 218.92.0.212 port 40547 ssh2
Apr 28 04:47:03 sshgateway sshd\[4119\]: Failed password for root from 218.92.0.212 port 40547 ssh2
2020-04-28 12:57:42

Recently Reported IPs

77.169.32.0 89.161.134.81 95.56.20.185 201.236.108.186
88.194.243.140 49.170.228.231 171.231.214.236 97.216.224.126
150.210.166.192 214.17.190.39 184.161.136.159 149.244.68.251
196.190.224.20 192.11.41.5 109.30.44.36 193.195.25.107
77.187.82.150 209.146.32.31 14.250.83.245 182.26.79.122