Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Minneapolis

Region: Minnesota

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.249.121.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38855
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;50.249.121.142.			IN	A

;; AUTHORITY SECTION:
.			542	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112101 1800 900 604800 86400

;; Query time: 99 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 22 04:06:19 CST 2019
;; MSG SIZE  rcvd: 118
Host info
142.121.249.50.in-addr.arpa domain name pointer 50-249-121-142-static.hfc.comcastbusiness.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.121.249.50.in-addr.arpa	name = 50-249-121-142-static.hfc.comcastbusiness.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.83.76.203 attackbots
$f2bV_matches
2019-12-09 00:23:48
168.243.91.19 attackbots
Dec  8 16:56:05 v22018086721571380 sshd[29299]: Failed password for invalid user fansler from 168.243.91.19 port 56485 ssh2
2019-12-09 00:21:56
51.68.44.13 attack
Dec  8 16:16:47 work-partkepr sshd\[16756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.44.13  user=root
Dec  8 16:16:49 work-partkepr sshd\[16756\]: Failed password for root from 51.68.44.13 port 54842 ssh2
...
2019-12-09 00:22:44
89.105.202.97 attackspam
Dec  8 10:55:32 ny01 sshd[21784]: Failed password for root from 89.105.202.97 port 50164 ssh2
Dec  8 11:01:13 ny01 sshd[22548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.105.202.97
Dec  8 11:01:15 ny01 sshd[22548]: Failed password for invalid user pirkle from 89.105.202.97 port 59374 ssh2
2019-12-09 00:08:23
171.246.63.51 attack
Unauthorized connection attempt detected from IP address 171.246.63.51 to port 445
2019-12-09 00:20:49
222.186.175.202 attackbots
Dec  8 19:08:34 debian-2gb-vpn-nbg1-1 sshd[26058]: Failed password for root from 222.186.175.202 port 59112 ssh2
Dec  8 19:08:38 debian-2gb-vpn-nbg1-1 sshd[26058]: Failed password for root from 222.186.175.202 port 59112 ssh2
Dec  8 19:08:44 debian-2gb-vpn-nbg1-1 sshd[26058]: Failed password for root from 222.186.175.202 port 59112 ssh2
Dec  8 19:08:47 debian-2gb-vpn-nbg1-1 sshd[26058]: Failed password for root from 222.186.175.202 port 59112 ssh2
2019-12-09 00:09:14
118.34.12.35 attackspambots
Dec  8 15:39:17 IngegnereFirenze sshd[18500]: Invalid user ottem from 118.34.12.35 port 57292
Dec  8 15:39:19 IngegnereFirenze sshd[18500]: Failed password for invalid user ottem from 118.34.12.35 port 57292 ssh2
Dec  8 15:45:25 IngegnereFirenze sshd[18660]: Invalid user ubnt from 118.34.12.35 port 37702
...
2019-12-09 00:05:25
185.36.81.230 attackbots
Rude login attack (2 tries in 1d)
2019-12-09 00:32:04
178.128.22.249 attackbots
Dec  8 17:27:18 andromeda sshd\[28321\]: Invalid user fike from 178.128.22.249 port 45213
Dec  8 17:27:18 andromeda sshd\[28321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.22.249
Dec  8 17:27:20 andromeda sshd\[28321\]: Failed password for invalid user fike from 178.128.22.249 port 45213 ssh2
2019-12-09 00:46:31
189.90.241.134 attackbots
Dec  8 06:31:14 web1 sshd\[19946\]: Invalid user qwer from 189.90.241.134
Dec  8 06:31:14 web1 sshd\[19946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.90.241.134
Dec  8 06:31:15 web1 sshd\[19946\]: Failed password for invalid user qwer from 189.90.241.134 port 42502 ssh2
Dec  8 06:38:39 web1 sshd\[20714\]: Invalid user password from 189.90.241.134
Dec  8 06:38:39 web1 sshd\[20714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.90.241.134
2019-12-09 00:40:42
187.188.251.219 attackspambots
Dec  5 07:01:01 vtv3 sshd[7217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.251.219 
Dec  5 07:01:03 vtv3 sshd[7217]: Failed password for invalid user mysql from 187.188.251.219 port 55172 ssh2
Dec  5 07:17:11 vtv3 sshd[15050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.251.219 
Dec  5 07:17:13 vtv3 sshd[15050]: Failed password for invalid user nevola from 187.188.251.219 port 50280 ssh2
Dec  5 07:25:02 vtv3 sshd[18358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.251.219 
Dec  5 07:39:42 vtv3 sshd[25383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.251.219 
Dec  5 07:39:44 vtv3 sshd[25383]: Failed password for invalid user fidjeland from 187.188.251.219 port 57056 ssh2
Dec  5 07:47:18 vtv3 sshd[29272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.251.2
2019-12-09 00:29:10
39.37.141.9 attackspam
Unauthorized connection attempt detected from IP address 39.37.141.9 to port 445
2019-12-09 00:39:53
62.210.72.13 attack
Dec  8 17:06:15 localhost sshd\[18501\]: Invalid user gangnes from 62.210.72.13 port 56594
Dec  8 17:06:15 localhost sshd\[18501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.72.13
Dec  8 17:06:16 localhost sshd\[18501\]: Failed password for invalid user gangnes from 62.210.72.13 port 56594 ssh2
2019-12-09 00:19:52
124.61.206.234 attackbots
Dec  8 15:58:54 web8 sshd\[3586\]: Invalid user sandnes from 124.61.206.234
Dec  8 15:58:54 web8 sshd\[3586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.61.206.234
Dec  8 15:58:56 web8 sshd\[3586\]: Failed password for invalid user sandnes from 124.61.206.234 port 57638 ssh2
Dec  8 16:07:01 web8 sshd\[7411\]: Invalid user thomasluk from 124.61.206.234
Dec  8 16:07:01 web8 sshd\[7411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.61.206.234
2019-12-09 00:21:13
36.89.247.26 attackbots
2019-12-08T17:00:35.875363  sshd[13077]: Invalid user omgserv from 36.89.247.26 port 60631
2019-12-08T17:00:35.889717  sshd[13077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.247.26
2019-12-08T17:00:35.875363  sshd[13077]: Invalid user omgserv from 36.89.247.26 port 60631
2019-12-08T17:00:37.984477  sshd[13077]: Failed password for invalid user omgserv from 36.89.247.26 port 60631 ssh2
2019-12-08T17:08:05.997369  sshd[13180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.247.26  user=root
2019-12-08T17:08:08.202360  sshd[13180]: Failed password for root from 36.89.247.26 port 37097 ssh2
...
2019-12-09 00:27:14

Recently Reported IPs

204.43.130.126 176.137.132.241 74.228.8.226 195.101.180.108
103.203.227.228 60.74.27.130 99.103.88.254 121.121.70.149
113.141.64.40 54.194.49.77 196.70.48.142 31.184.254.126
89.118.69.224 73.225.27.79 56.166.186.215 176.167.51.101
100.207.12.85 188.98.167.229 41.202.81.190 200.143.228.183