Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.199.41.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6908
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.199.41.242.			IN	A

;; AUTHORITY SECTION:
.			270	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 11:32:00 CST 2022
;; MSG SIZE  rcvd: 106
Host info
242.41.199.50.in-addr.arpa domain name pointer 50-199-41-242-static.hfc.comcastbusiness.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.41.199.50.in-addr.arpa	name = 50-199-41-242-static.hfc.comcastbusiness.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
119.28.32.96 attackbotsspam
2020-04-08 x@x
2020-04-08 x@x
2020-04-08 x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=119.28.32.96
2020-04-08 23:00:11
171.231.254.238 attackbots
1586349686 - 04/08/2020 14:41:26 Host: 171.231.254.238/171.231.254.238 Port: 445 TCP Blocked
2020-04-08 23:21:37
122.228.19.79 attackbots
GPL RPC portmap listing UDP 111 - port: 111 proto: UDP cat: Decode of an RPC Query
2020-04-08 22:42:35
222.110.165.141 attackbotsspam
SSH invalid-user multiple login attempts
2020-04-08 23:35:36
165.22.65.134 attackbotsspam
$f2bV_matches
2020-04-08 23:25:09
190.129.241.154 attackbotsspam
$f2bV_matches
2020-04-08 23:36:40
62.122.156.74 attack
Apr  8 14:22:13 localhost sshd[90388]: Invalid user deploy from 62.122.156.74 port 53934
Apr  8 14:22:13 localhost sshd[90388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.122.156.74
Apr  8 14:22:13 localhost sshd[90388]: Invalid user deploy from 62.122.156.74 port 53934
Apr  8 14:22:15 localhost sshd[90388]: Failed password for invalid user deploy from 62.122.156.74 port 53934 ssh2
Apr  8 14:29:49 localhost sshd[91137]: Invalid user smkim from 62.122.156.74 port 34812
...
2020-04-08 23:24:37
182.61.132.15 attack
SSH bruteforce (Triggered fail2ban)
2020-04-08 23:28:54
51.252.93.154 attackspambots
Automatic report - XMLRPC Attack
2020-04-08 23:05:22
34.82.176.231 attack
Apr  8 10:41:45 vps46666688 sshd[3122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.82.176.231
Apr  8 10:41:47 vps46666688 sshd[3122]: Failed password for invalid user sftpuser from 34.82.176.231 port 36614 ssh2
...
2020-04-08 23:20:48
189.190.26.9 attack
(sshd) Failed SSH login from 189.190.26.9 (MX/Mexico/dsl-189-190-26-9-dyn.prod-infinitum.com.mx): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr  8 10:46:43 host sshd[45424]: Invalid user bot from 189.190.26.9 port 46236
2020-04-08 23:07:48
122.55.190.12 attackbots
Apr  8 14:45:21 scw-6657dc sshd[10848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.55.190.12
Apr  8 14:45:21 scw-6657dc sshd[10848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.55.190.12
Apr  8 14:45:23 scw-6657dc sshd[10848]: Failed password for invalid user test from 122.55.190.12 port 50508 ssh2
...
2020-04-08 23:10:19
37.142.145.36 attackspambots
Port probing on unauthorized port 23
2020-04-08 23:03:52
140.143.159.11 attackbots
Apr  8 05:41:08 mockhub sshd[3823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.159.11
Apr  8 05:41:10 mockhub sshd[3823]: Failed password for invalid user play from 140.143.159.11 port 43140 ssh2
...
2020-04-08 23:44:22
129.211.124.109 attack
$f2bV_matches
2020-04-08 22:47:48

Recently Reported IPs

50.216.106.7 50.216.106.12 50.216.110.196 50.213.108.13
50.236.201.218 50.237.191.22 50.215.169.77 50.210.83.241
50.216.176.250 50.245.167.89 50.249.154.42 50.3.79.130
50.60.139.199 50.240.240.250 50.3.192.134 50.48.177.191
50.35.139.60 50.32.153.216 50.60.135.242 50.60.154.225