Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.167.104.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6838
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.167.104.106.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 09:46:05 CST 2025
;; MSG SIZE  rcvd: 107
Host info
106.104.167.50.in-addr.arpa domain name pointer c-50-167-104-106.unallocated.comcastbusiness.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.104.167.50.in-addr.arpa	name = c-50-167-104-106.unallocated.comcastbusiness.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
211.159.217.106 attackspambots
Aug  7 15:13:01 PorscheCustomer sshd[27261]: Failed password for root from 211.159.217.106 port 56734 ssh2
Aug  7 15:16:42 PorscheCustomer sshd[27340]: Failed password for root from 211.159.217.106 port 37322 ssh2
...
2020-08-07 22:28:42
191.232.242.173 attack
Aug  7 13:07:40 ns3033917 sshd[5507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.242.173
Aug  7 13:07:40 ns3033917 sshd[5507]: Invalid user ubuntu from 191.232.242.173 port 44302
Aug  7 13:07:42 ns3033917 sshd[5507]: Failed password for invalid user ubuntu from 191.232.242.173 port 44302 ssh2
...
2020-08-07 22:54:00
49.235.138.168 attackspambots
2020-08-07T13:57:55.664607amanda2.illicoweb.com sshd\[42522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.138.168  user=root
2020-08-07T13:57:58.218589amanda2.illicoweb.com sshd\[42522\]: Failed password for root from 49.235.138.168 port 40704 ssh2
2020-08-07T14:03:31.251234amanda2.illicoweb.com sshd\[43533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.138.168  user=root
2020-08-07T14:03:33.263390amanda2.illicoweb.com sshd\[43533\]: Failed password for root from 49.235.138.168 port 59944 ssh2
2020-08-07T14:06:05.078914amanda2.illicoweb.com sshd\[43972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.138.168  user=root
...
2020-08-07 22:48:30
104.248.29.200 attack
104.248.29.200 - - [07/Aug/2020:13:06:07 +0100] "POST /wp-login.php HTTP/1.1" 200 2017 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.29.200 - - [07/Aug/2020:13:06:12 +0100] "POST /wp-login.php HTTP/1.1" 200 1994 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.248.29.200 - - [07/Aug/2020:13:06:12 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-07 22:43:10
212.70.149.19 attack
Aug  7 17:05:51 srv01 postfix/smtpd\[1865\]: warning: unknown\[212.70.149.19\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  7 17:05:59 srv01 postfix/smtpd\[3969\]: warning: unknown\[212.70.149.19\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  7 17:06:00 srv01 postfix/smtpd\[31516\]: warning: unknown\[212.70.149.19\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  7 17:06:05 srv01 postfix/smtpd\[1865\]: warning: unknown\[212.70.149.19\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  7 17:06:21 srv01 postfix/smtpd\[3969\]: warning: unknown\[212.70.149.19\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-07 23:13:12
194.26.29.10 attackbots
[MK-VM3] Blocked by UFW
2020-08-07 22:38:35
167.99.66.2 attack
Aug  7 14:08:51 ncomp sshd[11827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.66.2  user=root
Aug  7 14:08:53 ncomp sshd[11827]: Failed password for root from 167.99.66.2 port 50910 ssh2
Aug  7 14:36:39 ncomp sshd[12365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.66.2  user=root
Aug  7 14:36:40 ncomp sshd[12365]: Failed password for root from 167.99.66.2 port 39172 ssh2
2020-08-07 22:28:28
90.177.244.100 attackspambots
brute-force attack on telnet (23) and Winbox (8291)
2020-08-07 23:05:00
117.218.150.156 attackspam
Port probing on unauthorized port 445
2020-08-07 22:33:30
190.255.222.2 attackspambots
(sshd) Failed SSH login from 190.255.222.2 (CO/Colombia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug  7 15:17:17 amsweb01 sshd[26812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.255.222.2  user=root
Aug  7 15:17:19 amsweb01 sshd[26812]: Failed password for root from 190.255.222.2 port 50416 ssh2
Aug  7 15:29:00 amsweb01 sshd[28200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.255.222.2  user=root
Aug  7 15:29:02 amsweb01 sshd[28200]: Failed password for root from 190.255.222.2 port 60093 ssh2
Aug  7 15:36:25 amsweb01 sshd[29280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.255.222.2  user=root
2020-08-07 22:48:08
164.132.38.166 attack
164.132.38.166 - - [07/Aug/2020:13:06:12 +0100] "POST /wp-login.php HTTP/1.1" 200 1954 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
164.132.38.166 - - [07/Aug/2020:13:06:13 +0100] "POST /wp-login.php HTTP/1.1" 200 1953 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
164.132.38.166 - - [07/Aug/2020:13:06:13 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-07 22:30:09
112.85.42.89 attackspam
Aug  7 16:48:54 PorscheCustomer sshd[29308]: Failed password for root from 112.85.42.89 port 36396 ssh2
Aug  7 16:50:14 PorscheCustomer sshd[29324]: Failed password for root from 112.85.42.89 port 31778 ssh2
...
2020-08-07 23:07:45
96.45.182.124 attack
2020-08-07T13:53:45.429795ns386461 sshd\[27861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.45.182.124.16clouds.com  user=root
2020-08-07T13:53:46.659854ns386461 sshd\[27861\]: Failed password for root from 96.45.182.124 port 54772 ssh2
2020-08-07T14:01:04.255311ns386461 sshd\[1728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.45.182.124.16clouds.com  user=root
2020-08-07T14:01:06.094546ns386461 sshd\[1728\]: Failed password for root from 96.45.182.124 port 45756 ssh2
2020-08-07T14:05:57.450450ns386461 sshd\[6317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.45.182.124.16clouds.com  user=root
...
2020-08-07 22:58:19
162.243.22.112 attack
162.243.22.112 - - [07/Aug/2020:15:57:25 +0200] "GET /wp-login.php HTTP/1.1" 200 6310 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
162.243.22.112 - - [07/Aug/2020:15:57:32 +0200] "POST /wp-login.php HTTP/1.1" 200 6561 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
162.243.22.112 - - [07/Aug/2020:15:57:33 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-07 22:41:55
1.160.129.170 attack
 TCP (SYN) 1.160.129.170:25751 -> port 2323, len 40
2020-08-07 22:56:23

Recently Reported IPs

167.70.143.190 65.217.233.178 243.129.245.58 145.232.14.204
227.66.100.180 44.232.81.241 95.220.160.200 124.237.22.129
117.150.206.101 213.143.225.18 115.75.208.155 190.108.55.211
5.84.139.78 227.175.160.111 148.166.40.221 236.9.229.242
158.187.54.149 170.213.173.177 81.34.54.118 253.78.244.239