Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lincoln University

Region: Pennsylvania

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.219.71.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31439
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.219.71.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062901 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 30 09:01:48 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 142.71.219.50.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.71.219.50.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
82.221.105.6 attack
Fail2Ban Ban Triggered
2020-03-07 23:17:08
114.69.249.194 attackbots
$f2bV_matches
2020-03-07 23:07:33
77.232.100.165 attackbotsspam
Mar  7 14:24:48 server sshd[3892782]: Failed password for invalid user gmodserver1 from 77.232.100.165 port 47897 ssh2
Mar  7 14:29:32 server sshd[3899508]: Failed password for invalid user kamal from 77.232.100.165 port 56455 ssh2
Mar  7 14:34:09 server sshd[3906406]: Failed password for root from 77.232.100.165 port 36778 ssh2
2020-03-07 22:44:22
115.254.63.52 attack
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.254.63.52 
Failed password for invalid user flashback@1234 from 115.254.63.52 port 60833 ssh2
Failed password for root from 115.254.63.52 port 47517 ssh2
2020-03-07 22:29:00
101.109.41.141 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2020-03-07 22:51:14
14.160.146.58 attack
Port probing on unauthorized port 9530
2020-03-07 22:55:27
106.54.120.49 attackspam
20 attempts against mh-misbehave-ban on ice
2020-03-07 22:26:55
93.113.111.193 attackbots
Automatic report - XMLRPC Attack
2020-03-07 23:10:04
192.117.173.155 attackspambots
suspicious action Sat, 07 Mar 2020 10:33:43 -0300
2020-03-07 23:03:20
68.193.15.127 attack
Honeypot attack, port: 5555, PTR: ool-44c10f7f.dyn.optonline.net.
2020-03-07 22:44:43
64.202.184.249 attackspam
WordPress login Brute force / Web App Attack on client site.
2020-03-07 23:15:06
159.65.35.14 attackbots
fail2ban
2020-03-07 22:48:57
167.172.228.143 attackbotsspam
Mar  7 14:33:38 host sshd[17024]: Invalid user danny from 167.172.228.143 port 33894
...
2020-03-07 23:05:57
190.223.26.38 attackbotsspam
Mar  7 15:34:09 MK-Soft-Root1 sshd[27410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.223.26.38 
Mar  7 15:34:11 MK-Soft-Root1 sshd[27410]: Failed password for invalid user web1 from 190.223.26.38 port 14678 ssh2
...
2020-03-07 23:00:42
186.226.167.206 attackbots
suspicious action Sat, 07 Mar 2020 10:33:59 -0300
2020-03-07 22:50:22

Recently Reported IPs

134.122.83.190 124.179.111.21 105.89.63.194 151.216.89.46
54.100.59.161 52.143.91.73 57.128.36.234 53.254.141.39
154.185.202.201 14.222.45.201 171.221.123.44 213.162.182.204
79.233.249.142 65.53.59.38 246.101.183.114 116.157.178.32
33.219.125.30 115.114.227.68 11.26.20.78 134.229.210.133