Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.200.51.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47420
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.200.51.70.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 04:43:04 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 70.51.200.50.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.51.200.50.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
1.214.61.125 attack
Dec 16 22:14:56 sso sshd[9641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.214.61.125
Dec 16 22:14:58 sso sshd[9641]: Failed password for invalid user named from 1.214.61.125 port 32994 ssh2
...
2019-12-17 06:00:59
42.247.22.66 attack
Unauthorized connection attempt detected from IP address 42.247.22.66 to port 22
2019-12-17 06:12:48
172.81.253.233 attack
2019-12-16T21:53:52.162655shield sshd\[16734\]: Invalid user asd123 from 172.81.253.233 port 54518
2019-12-16T21:53:52.167195shield sshd\[16734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.253.233
2019-12-16T21:53:54.962164shield sshd\[16734\]: Failed password for invalid user asd123 from 172.81.253.233 port 54518 ssh2
2019-12-16T21:59:53.183930shield sshd\[17540\]: Invalid user 123qwe@ from 172.81.253.233 port 57736
2019-12-16T21:59:53.188234shield sshd\[17540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.253.233
2019-12-17 06:16:24
159.89.162.118 attack
Dec 16 11:27:50 kapalua sshd\[12827\]: Invalid user joni from 159.89.162.118
Dec 16 11:27:50 kapalua sshd\[12827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.162.118
Dec 16 11:27:52 kapalua sshd\[12827\]: Failed password for invalid user joni from 159.89.162.118 port 49100 ssh2
Dec 16 11:34:17 kapalua sshd\[13556\]: Invalid user listen from 159.89.162.118
Dec 16 11:34:17 kapalua sshd\[13556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.162.118
2019-12-17 05:41:13
145.239.82.192 attack
Dec 16 22:12:09 XXX sshd[63027]: Invalid user caran from 145.239.82.192 port 38930
2019-12-17 06:06:30
51.68.192.106 attackbotsspam
Dec 16 11:35:19 tdfoods sshd\[12607\]: Invalid user asterisk from 51.68.192.106
Dec 16 11:35:20 tdfoods sshd\[12607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip106.ip-51-68-192.eu
Dec 16 11:35:21 tdfoods sshd\[12607\]: Failed password for invalid user asterisk from 51.68.192.106 port 58504 ssh2
Dec 16 11:40:09 tdfoods sshd\[13118\]: Invalid user louise from 51.68.192.106
Dec 16 11:40:09 tdfoods sshd\[13118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip106.ip-51-68-192.eu
2019-12-17 05:56:10
5.135.232.8 attackspam
Dec 16 22:10:14 web8 sshd\[17076\]: Invalid user userA from 5.135.232.8
Dec 16 22:10:14 web8 sshd\[17076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.232.8
Dec 16 22:10:15 web8 sshd\[17076\]: Failed password for invalid user userA from 5.135.232.8 port 55650 ssh2
Dec 16 22:15:27 web8 sshd\[19512\]: Invalid user test from 5.135.232.8
Dec 16 22:15:27 web8 sshd\[19512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.232.8
2019-12-17 06:15:51
209.17.96.58 attack
209.17.96.58 was recorded 18 times by 15 hosts attempting to connect to the following ports: 3389,5061,5353,20249,8531,987,8000,118,7443,3333,68,5222,161,995,143. Incident counter (4h, 24h, all-time): 18, 64, 2269
2019-12-17 06:07:57
189.112.109.185 attackspambots
2019-12-16T21:14:59.670941homeassistant sshd[30123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.109.185  user=root
2019-12-16T21:15:01.183243homeassistant sshd[30123]: Failed password for root from 189.112.109.185 port 35092 ssh2
...
2019-12-17 05:56:54
78.232.145.24 attack
Invalid user teru from 78.232.145.24 port 43882
2019-12-17 06:09:08
176.31.110.213 attack
Unauthorized SSH login attempts
2019-12-17 06:06:01
40.92.71.48 attackspambots
Dec 17 00:15:05 debian-2gb-vpn-nbg1-1 kernel: [909273.627028] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.71.48 DST=78.46.192.101 LEN=52 TOS=0x02 PREC=0x00 TTL=109 ID=20322 DF PROTO=TCP SPT=52740 DPT=25 WINDOW=8192 RES=0x00 CWR ECE SYN URGP=0
2019-12-17 05:49:32
62.234.222.111 attack
$f2bV_matches
2019-12-17 06:18:18
185.143.223.129 attackbots
Dec 16 22:18:37 h2177944 kernel: \[9406125.376749\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.129 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=5114 PROTO=TCP SPT=51324 DPT=2324 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 16 22:21:20 h2177944 kernel: \[9406288.498475\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.129 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=1877 PROTO=TCP SPT=51324 DPT=1594 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 16 22:45:24 h2177944 kernel: \[9407732.131163\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.129 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=62749 PROTO=TCP SPT=51324 DPT=2734 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 16 22:54:25 h2177944 kernel: \[9408272.847175\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.129 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=12043 PROTO=TCP SPT=51324 DPT=2825 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 16 22:59:55 h2177944 kernel: \[9408602.683074\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.129 DST=85.2
2019-12-17 06:17:15
133.130.99.77 attack
Dec 16 16:59:59 plusreed sshd[1000]: Invalid user mamen from 133.130.99.77
...
2019-12-17 06:08:27

Recently Reported IPs

31.182.238.4 222.129.188.78 73.111.31.11 100.228.142.39
161.78.224.115 184.21.229.215 219.22.133.61 193.74.153.44
153.122.123.93 170.67.107.51 137.251.20.78 246.64.61.170
120.247.120.75 70.52.128.71 115.7.132.21 204.170.76.21
239.137.203.191 38.76.108.21 243.121.237.249 175.211.246.239