Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Terre Haute

Region: Indiana

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.121.99.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61266
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.121.99.116.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 10:23:20 CST 2025
;; MSG SIZE  rcvd: 106
Host info
116.99.121.50.in-addr.arpa domain name pointer static-50-121-99-116.ftwy.in.frontiernet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
116.99.121.50.in-addr.arpa	name = static-50-121-99-116.ftwy.in.frontiernet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.236.75.62 attackspambots
Automatic report - XMLRPC Attack
2020-03-10 05:08:07
107.170.199.180 attack
Feb 17 01:14:29 ms-srv sshd[7152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.199.180
Feb 17 01:14:30 ms-srv sshd[7152]: Failed password for invalid user mandy from 107.170.199.180 port 46027 ssh2
2020-03-10 05:04:23
1.23.17.87 attackspam
Email rejected due to spam filtering
2020-03-10 05:10:01
89.248.168.202 attack
Mar  9 22:03:04 debian-2gb-nbg1-2 kernel: \[6046935.095288\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=89.248.168.202 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=47823 PROTO=TCP SPT=57395 DPT=6455 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-10 05:13:58
51.254.36.55 attack
[portscan] Port scan
2020-03-10 05:20:30
157.230.235.233 attackspambots
Sep  1 01:21:24 ms-srv sshd[59463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.235.233
Sep  1 01:21:26 ms-srv sshd[59463]: Failed password for invalid user rafi from 157.230.235.233 port 50304 ssh2
2020-03-10 05:07:43
156.96.118.252 attackbotsspam
firewall-block, port(s): 123/udp
2020-03-10 05:06:18
77.42.121.133 attackspambots
Automatic report - Port Scan Attack
2020-03-10 05:28:51
157.245.188.231 attackspambots
Automatic report - XMLRPC Attack
2020-03-10 05:05:32
171.229.170.97 attack
firewall-block, port(s): 23/tcp
2020-03-10 05:03:37
213.74.69.141 attack
Port 1433 Scan
2020-03-10 04:59:22
222.186.30.35 attackspam
Mar  9 22:00:11 server sshd[1733813]: Failed password for root from 222.186.30.35 port 64006 ssh2
Mar  9 22:00:13 server sshd[1733813]: Failed password for root from 222.186.30.35 port 64006 ssh2
Mar  9 22:00:16 server sshd[1733813]: Failed password for root from 222.186.30.35 port 64006 ssh2
2020-03-10 05:00:49
180.232.114.61 attack
Brute-force general attack.
2020-03-10 05:12:15
199.19.226.60 attack
Feb 17 05:25:13 ms-srv sshd[21160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.19.226.60
Feb 17 05:25:15 ms-srv sshd[21160]: Failed password for invalid user ankit from 199.19.226.60 port 13478 ssh2
2020-03-10 05:19:02
80.227.12.38 attackspam
Mar  9 20:13:06 marvibiene sshd[59766]: Invalid user dolphin from 80.227.12.38 port 38072
Mar  9 20:13:06 marvibiene sshd[59766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.227.12.38
Mar  9 20:13:06 marvibiene sshd[59766]: Invalid user dolphin from 80.227.12.38 port 38072
Mar  9 20:13:09 marvibiene sshd[59766]: Failed password for invalid user dolphin from 80.227.12.38 port 38072 ssh2
...
2020-03-10 05:13:02

Recently Reported IPs

54.13.212.80 107.197.221.231 123.197.108.104 232.58.11.140
25.208.62.126 227.41.245.219 87.13.18.116 149.223.41.201
94.47.5.208 144.222.134.175 238.153.31.175 194.101.196.147
131.115.73.159 131.241.52.116 218.95.64.237 199.7.180.220
167.167.222.150 139.207.121.124 214.170.19.190 75.209.31.166