Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.204.108.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54146
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.204.108.53.			IN	A

;; AUTHORITY SECTION:
.			433	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 03:05:36 CST 2022
;; MSG SIZE  rcvd: 106
Host info
53.108.204.50.in-addr.arpa is an alias for 53.0/26.108.204.50.in-addr.arpa.
53.0/26.108.204.50.in-addr.arpa domain name pointer wighotfix.finys.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
53.108.204.50.in-addr.arpa	canonical name = 53.0/26.108.204.50.in-addr.arpa.
53.0/26.108.204.50.in-addr.arpa	name = wighotfix.finys.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.238.176.13 attackspam
Jul 26 11:53:04 srv-4 sshd\[20773\]: Invalid user admin from 41.238.176.13
Jul 26 11:53:04 srv-4 sshd\[20773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.238.176.13
Jul 26 11:53:06 srv-4 sshd\[20773\]: Failed password for invalid user admin from 41.238.176.13 port 38765 ssh2
...
2019-07-27 03:18:14
186.31.65.66 attackspambots
Jul 26 14:13:37 vps200512 sshd\[3749\]: Invalid user xp from 186.31.65.66
Jul 26 14:13:37 vps200512 sshd\[3749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.31.65.66
Jul 26 14:13:39 vps200512 sshd\[3749\]: Failed password for invalid user xp from 186.31.65.66 port 3329 ssh2
Jul 26 14:18:34 vps200512 sshd\[3862\]: Invalid user yu from 186.31.65.66
Jul 26 14:18:34 vps200512 sshd\[3862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.31.65.66
2019-07-27 03:28:07
178.33.22.154 attackspambots
2019-07-26T19:48:03.432145  sshd[32395]: Invalid user ts3server from 178.33.22.154 port 47712
2019-07-26T19:48:03.446602  sshd[32395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.22.154
2019-07-26T19:48:03.432145  sshd[32395]: Invalid user ts3server from 178.33.22.154 port 47712
2019-07-26T19:48:05.685711  sshd[32395]: Failed password for invalid user ts3server from 178.33.22.154 port 47712 ssh2
2019-07-26T19:52:10.113903  sshd[32418]: Invalid user prashant from 178.33.22.154 port 42214
...
2019-07-27 02:38:01
78.170.185.38 attackbotsspam
Automatic report - Port Scan Attack
2019-07-27 03:15:12
5.238.181.44 attackbotsspam
Jul 26 10:38:53 h2034429 postfix/smtpd[20408]: connect from unknown[5.238.181.44]
Jul x@x
Jul 26 10:38:54 h2034429 postfix/smtpd[20408]: lost connection after DATA from unknown[5.238.181.44]
Jul 26 10:38:54 h2034429 postfix/smtpd[20408]: disconnect from unknown[5.238.181.44] ehlo=1 mail=1 rcpt=0/1 data=0/1 commands=2/4
Jul 26 10:39:09 h2034429 postfix/smtpd[20408]: connect from unknown[5.238.181.44]
Jul x@x
Jul 26 10:39:10 h2034429 postfix/smtpd[20408]: lost connection after DATA from unknown[5.238.181.44]
Jul 26 10:39:10 h2034429 postfix/smtpd[20408]: disconnect from unknown[5.238.181.44] ehlo=1 mail=1 rcpt=0/1 data=0/1 commands=2/4
Jul 26 10:39:21 h2034429 postfix/smtpd[20408]: connect from unknown[5.238.181.44]
Jul x@x
Jul 26 10:39:22 h2034429 postfix/smtpd[20408]: lost connection after DATA from unknown[5.238.181.44]
Jul 26 10:39:22 h2034429 postfix/smtpd[20408]: disconnect from unknown[5.238.181.44] ehlo=1 mail=1 rcpt=0/1 data=0/1 commands=2/4


........
-----------------------------------------------
ht
2019-07-27 03:03:50
192.99.216.184 attackspambots
Jul 26 21:05:05 yabzik sshd[9823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.216.184
Jul 26 21:05:07 yabzik sshd[9823]: Failed password for invalid user fo from 192.99.216.184 port 37789 ssh2
Jul 26 21:09:23 yabzik sshd[11267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.216.184
2019-07-27 02:58:45
62.192.26.242 attack
Jul2610:53:25server2kernel:Firewall:\*PortFlood\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=62.192.26.242DST=136.243.224.50LEN=64TOS=0x00PREC=0x00TTL=55ID=0DFPROTO=TCPSPT=12711DPT=80WINDOW=65535RES=0x00SYNURGP=0Jul2610:53:25server2kernel:Firewall:\*PortFlood\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=62.192.26.242DST=136.243.224.50LEN=64TOS=0x00PREC=0x00TTL=55ID=0DFPROTO=TCPSPT=22881DPT=80WINDOW=65535RES=0x00SYNURGP=0Jul2610:53:25server2kernel:Firewall:\*PortFlood\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=62.192.26.242DST=136.243.224.50LEN=64TOS=0x00PREC=0x00TTL=55ID=0DFPROTO=TCPSPT=19175DPT=80WINDOW=65535RES=0x00SYNURGP=0Jul2610:53:25server2kernel:Firewall:\*PortFlood\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=62.192.26.242DST=136.243.224.50LEN=64TOS=0x00PREC=0x00TTL=55ID=0DFPROTO=TCPSPT=14233DPT=80WINDOW=65535RES=0x00SYNURGP=0Jul2610:53:25server2kernel:Firewall:\*PortFlood\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=62.
2019-07-27 02:39:15
61.147.42.237 attackspambots
port scan and connect, tcp 23 (telnet)
2019-07-27 02:49:09
91.134.143.2 attack
Jul 26 19:05:49 mail sshd\[31339\]: Failed password for root from 91.134.143.2 port 55122 ssh2
Jul 26 19:22:29 mail sshd\[31762\]: Invalid user cynthia from 91.134.143.2 port 33480
Jul 26 19:22:29 mail sshd\[31762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.143.2
...
2019-07-27 02:47:39
81.22.45.100 attackbotsspam
Jul 26 20:57:26 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.100 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=244 PROTO=TCP SPT=57431 DPT=9482 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-07-27 03:17:25
177.96.131.97 attackbotsspam
Jul 26 17:13:17 vpn01 sshd\[29538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.96.131.97  user=root
Jul 26 17:13:19 vpn01 sshd\[29538\]: Failed password for root from 177.96.131.97 port 18413 ssh2
Jul 26 17:43:10 vpn01 sshd\[29643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.96.131.97  user=root
2019-07-27 03:19:21
83.94.206.60 attack
Triggered by Fail2Ban
2019-07-27 02:55:00
46.166.139.1 attack
\[2019-07-26 14:32:30\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-26T14:32:30.487-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441244739005",SessionID="0x7ff4d07c2178",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.139.1/53624",ACLName="no_extension_match"
\[2019-07-26 14:32:45\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-26T14:32:45.557-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00441254929805",SessionID="0x7ff4d0447758",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.139.1/49921",ACLName="no_extension_match"
\[2019-07-26 14:32:47\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-26T14:32:47.034-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441294507632",SessionID="0x7ff4d05151f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.139.1/52992",ACLName="no_extensi
2019-07-27 02:37:41
200.194.61.244 attackspambots
Automatic report - Port Scan Attack
2019-07-27 03:16:12
78.158.131.52 attack
Netgear DGN Device Remote Command Execution Vulnerability, PTR: cpe-668076.ip.primehome.com.
2019-07-27 03:27:39

Recently Reported IPs

91.42.62.54 77.155.60.1 212.42.150.191 89.169.154.234
252.202.127.79 222.160.210.60 219.220.246.51 131.21.124.107
204.29.82.32 135.186.139.58 5.204.153.152 95.186.36.220
173.49.240.54 166.241.53.92 15.209.191.196 33.91.75.39
174.83.84.187 163.151.212.82 56.223.111.205 140.148.7.135