Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Houston

Region: Texas

Country: United States

Internet Service Provider: Comcast Cable Communications LLC

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspam
Honeypot attack, port: 81, PTR: 50-252-47-29-static.hfc.comcastbusiness.net.
2020-09-07 02:26:25
attackspam
Honeypot attack, port: 81, PTR: 50-252-47-29-static.hfc.comcastbusiness.net.
2020-09-06 17:49:32
attackbotsspam
Honeypot attack, port: 81, PTR: 50-252-47-29-static.hfc.comcastbusiness.net.
2020-04-18 01:14:08
attackspambots
Honeypot attack, port: 81, PTR: 50-252-47-29-static.hfc.comcastbusiness.net.
2020-01-12 06:31:01
attackspam
Unauthorized connection attempt detected from IP address 50.252.47.29 to port 23
2019-12-30 03:14:40
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.252.47.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5390
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;50.252.47.29.			IN	A

;; AUTHORITY SECTION:
.			445	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122901 1800 900 604800 86400

;; Query time: 902 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 30 03:14:37 CST 2019
;; MSG SIZE  rcvd: 116
Host info
29.47.252.50.in-addr.arpa domain name pointer 50-252-47-29-static.hfc.comcastbusiness.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
29.47.252.50.in-addr.arpa	name = 50-252-47-29-static.hfc.comcastbusiness.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
193.169.253.173 attack
2020-09-09T01:43:01.194538lavrinenko.info sshd[28565]: Failed password for root from 193.169.253.173 port 55828 ssh2
2020-09-09T01:44:18.659762lavrinenko.info sshd[28611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.253.173  user=root
2020-09-09T01:44:20.328611lavrinenko.info sshd[28611]: Failed password for root from 193.169.253.173 port 32816 ssh2
2020-09-09T01:45:37.673990lavrinenko.info sshd[28661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.253.173  user=root
2020-09-09T01:45:39.854743lavrinenko.info sshd[28661]: Failed password for root from 193.169.253.173 port 38172 ssh2
...
2020-09-09 08:10:06
82.212.129.252 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-09-09 08:18:45
79.37.78.132 attackbots
port 23
2020-09-09 07:55:18
186.10.245.152 attack
Auto Fail2Ban report, multiple SSH login attempts.
2020-09-09 07:56:09
222.186.180.130 attackspam
2020-09-08T23:50:19.363636shield sshd\[17891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
2020-09-08T23:50:20.475266shield sshd\[17891\]: Failed password for root from 222.186.180.130 port 12053 ssh2
2020-09-08T23:50:22.956422shield sshd\[17891\]: Failed password for root from 222.186.180.130 port 12053 ssh2
2020-09-08T23:50:25.851176shield sshd\[17891\]: Failed password for root from 222.186.180.130 port 12053 ssh2
2020-09-08T23:50:40.573976shield sshd\[17931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
2020-09-09 07:50:48
117.239.209.24 attackspambots
SSH Invalid Login
2020-09-09 07:53:11
167.99.90.240 attackspambots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-09-09 08:06:37
78.190.110.102 attackbotsspam
20/9/8@12:53:14: FAIL: Alarm-Network address from=78.190.110.102
...
2020-09-09 08:01:09
69.55.49.187 attack
Sep  9 01:48:04 buvik sshd[17252]: Invalid user oracle from 69.55.49.187
Sep  9 01:48:04 buvik sshd[17252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.55.49.187
Sep  9 01:48:06 buvik sshd[17252]: Failed password for invalid user oracle from 69.55.49.187 port 52730 ssh2
...
2020-09-09 08:01:42
58.71.220.66 attack
Sep  8 19:50:26 ws12vmsma01 sshd[55947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.71.220.66 
Sep  8 19:50:26 ws12vmsma01 sshd[55947]: Invalid user persilos from 58.71.220.66
Sep  8 19:50:28 ws12vmsma01 sshd[55947]: Failed password for invalid user persilos from 58.71.220.66 port 50520 ssh2
...
2020-09-09 07:58:56
51.210.109.104 attackbotsspam
2020-09-09T03:36:43.766523hostname sshd[9382]: Invalid user admin from 51.210.109.104 port 33114
2020-09-09T03:36:45.897746hostname sshd[9382]: Failed password for invalid user admin from 51.210.109.104 port 33114 ssh2
2020-09-09T03:43:41.875676hostname sshd[12140]: Invalid user test4 from 51.210.109.104 port 38320
...
2020-09-09 08:19:16
83.110.220.35 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-09-09 08:00:40
222.186.175.150 attackspambots
Sep  9 03:08:04 ift sshd\[27478\]: Failed password for root from 222.186.175.150 port 47546 ssh2Sep  9 03:08:18 ift sshd\[27478\]: Failed password for root from 222.186.175.150 port 47546 ssh2Sep  9 03:08:24 ift sshd\[27512\]: Failed password for root from 222.186.175.150 port 49554 ssh2Sep  9 03:08:27 ift sshd\[27512\]: Failed password for root from 222.186.175.150 port 49554 ssh2Sep  9 03:08:46 ift sshd\[27548\]: Failed password for root from 222.186.175.150 port 4102 ssh2
...
2020-09-09 08:11:23
114.118.97.195 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-09-09 08:21:36
5.105.147.4 attackspambots
20/9/8@13:14:22: FAIL: Alarm-Network address from=5.105.147.4
20/9/8@13:14:22: FAIL: Alarm-Network address from=5.105.147.4
...
2020-09-09 07:57:18

Recently Reported IPs

34.222.15.100 118.192.130.74 111.186.15.242 34.93.149.128
125.26.119.158 14.109.73.43 217.60.178.9 121.139.149.141
24.11.21.189 178.40.128.74 46.79.24.239 109.207.94.153
12.223.76.5 23.24.196.134 5.164.218.243 175.166.114.14
2.176.210.5 2.206.193.217 132.183.5.83 59.86.143.222