Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.168.12.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27504
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.168.12.57.			IN	A

;; AUTHORITY SECTION:
.			458	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022110801 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 09 03:54:48 CST 2022
;; MSG SIZE  rcvd: 105
Host info
57.12.168.50.in-addr.arpa domain name pointer c-50-168-12-57.unallocated.comcastbusiness.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
57.12.168.50.in-addr.arpa	name = c-50-168-12-57.unallocated.comcastbusiness.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.65.201.26 attackspam
Aug 21 02:59:47 server sshd\[26455\]: Invalid user lfs from 112.65.201.26 port 19772
Aug 21 02:59:47 server sshd\[26455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.65.201.26
Aug 21 02:59:49 server sshd\[26455\]: Failed password for invalid user lfs from 112.65.201.26 port 19772 ssh2
Aug 21 03:03:27 server sshd\[31421\]: Invalid user deploy from 112.65.201.26 port 36321
Aug 21 03:03:27 server sshd\[31421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.65.201.26
2019-08-21 08:04:42
94.191.93.34 attackbotsspam
Aug 21 00:45:12 vibhu-HP-Z238-Microtower-Workstation sshd\[878\]: Invalid user red5 from 94.191.93.34
Aug 21 00:45:12 vibhu-HP-Z238-Microtower-Workstation sshd\[878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.93.34
Aug 21 00:45:14 vibhu-HP-Z238-Microtower-Workstation sshd\[878\]: Failed password for invalid user red5 from 94.191.93.34 port 50188 ssh2
Aug 21 00:47:49 vibhu-HP-Z238-Microtower-Workstation sshd\[942\]: Invalid user ed from 94.191.93.34
Aug 21 00:47:49 vibhu-HP-Z238-Microtower-Workstation sshd\[942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.93.34
...
2019-08-21 07:40:59
193.70.114.154 attackspambots
Aug 21 06:55:08 lcl-usvr-02 sshd[32591]: Invalid user ksg from 193.70.114.154 port 52281
Aug 21 06:55:08 lcl-usvr-02 sshd[32591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.114.154
Aug 21 06:55:08 lcl-usvr-02 sshd[32591]: Invalid user ksg from 193.70.114.154 port 52281
Aug 21 06:55:10 lcl-usvr-02 sshd[32591]: Failed password for invalid user ksg from 193.70.114.154 port 52281 ssh2
Aug 21 06:58:55 lcl-usvr-02 sshd[1002]: Invalid user tu from 193.70.114.154 port 46445
...
2019-08-21 08:07:58
129.211.24.100 attackspambots
Aug 21 02:25:13 server sshd\[24841\]: Invalid user alfons from 129.211.24.100 port 35606
Aug 21 02:25:13 server sshd\[24841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.24.100
Aug 21 02:25:15 server sshd\[24841\]: Failed password for invalid user alfons from 129.211.24.100 port 35606 ssh2
Aug 21 02:30:07 server sshd\[13639\]: User root from 129.211.24.100 not allowed because listed in DenyUsers
Aug 21 02:30:07 server sshd\[13639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.24.100  user=root
2019-08-21 07:45:11
185.197.75.143 attack
Total attacks: 2
2019-08-21 07:23:54
198.211.114.102 attack
Aug 20 18:46:37 lnxmail61 sshd[8778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.114.102
2019-08-21 08:06:10
128.199.107.252 attackbots
2019-08-20T23:37:49.794464abusebot.cloudsearch.cf sshd\[18678\]: Invalid user csgo from 128.199.107.252 port 34544
2019-08-21 08:02:38
142.93.81.77 attackbots
Aug 20 13:18:17 friendsofhawaii sshd\[7274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.81.77  user=root
Aug 20 13:18:19 friendsofhawaii sshd\[7274\]: Failed password for root from 142.93.81.77 port 41952 ssh2
Aug 20 13:21:39 friendsofhawaii sshd\[7609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.81.77  user=root
Aug 20 13:21:40 friendsofhawaii sshd\[7609\]: Failed password for root from 142.93.81.77 port 45508 ssh2
Aug 20 13:25:33 friendsofhawaii sshd\[7907\]: Invalid user transmission from 142.93.81.77
2019-08-21 07:58:51
118.24.38.53 attackbots
Aug 20 23:37:53 server sshd\[20612\]: Invalid user oracle from 118.24.38.53 port 35738
Aug 20 23:37:53 server sshd\[20612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.38.53
Aug 20 23:37:55 server sshd\[20612\]: Failed password for invalid user oracle from 118.24.38.53 port 35738 ssh2
Aug 20 23:41:20 server sshd\[22726\]: Invalid user vagrant from 118.24.38.53 port 38276
Aug 20 23:41:20 server sshd\[22726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.38.53
2019-08-21 08:04:06
78.175.140.103 attackbotsspam
Automatic report - Port Scan Attack
2019-08-21 07:49:26
194.158.36.162 attack
Syn flood / slowloris
2019-08-21 07:54:39
51.68.70.175 attackbotsspam
Aug 21 00:07:19 Ubuntu-1404-trusty-64-minimal sshd\[20739\]: Invalid user info3 from 51.68.70.175
Aug 21 00:07:19 Ubuntu-1404-trusty-64-minimal sshd\[20739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.70.175
Aug 21 00:07:21 Ubuntu-1404-trusty-64-minimal sshd\[20739\]: Failed password for invalid user info3 from 51.68.70.175 port 48580 ssh2
Aug 21 00:25:52 Ubuntu-1404-trusty-64-minimal sshd\[3138\]: Invalid user asdfg from 51.68.70.175
Aug 21 00:25:52 Ubuntu-1404-trusty-64-minimal sshd\[3138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.70.175
2019-08-21 08:09:12
5.3.6.82 attack
Aug 20 20:38:31 meumeu sshd[18099]: Failed password for invalid user hoster from 5.3.6.82 port 58352 ssh2
Aug 20 20:42:32 meumeu sshd[18565]: Failed password for invalid user santiago from 5.3.6.82 port 55760 ssh2
...
2019-08-21 07:24:36
213.154.77.61 attackspambots
Aug 20 18:41:30 dedicated sshd[22066]: Invalid user git from 213.154.77.61 port 34072
2019-08-21 07:58:28
41.111.135.196 attackspam
Aug 20 07:54:37 php1 sshd\[13227\]: Invalid user files from 41.111.135.196
Aug 20 07:54:37 php1 sshd\[13227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.111.135.196
Aug 20 07:54:39 php1 sshd\[13227\]: Failed password for invalid user files from 41.111.135.196 port 33188 ssh2
Aug 20 08:03:40 php1 sshd\[13992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.111.135.196  user=root
Aug 20 08:03:41 php1 sshd\[13992\]: Failed password for root from 41.111.135.196 port 47732 ssh2
2019-08-21 08:05:00

Recently Reported IPs

138.235.168.215 133.83.221.166 76.197.117.162 44.208.215.95
169.147.63.87 17.39.98.29 194.198.158.17 216.249.5.77
200.91.241.94 91.206.141.190 225.93.148.78 165.163.56.62
82.140.180.116 212.163.181.106 224.155.216.1 68.107.73.1
92.28.129.95 129.145.67.9 183.94.120.8 195.2.84.160