City: Abilene
Region: Texas
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 50.24.0.0 - 50.27.255.255
CIDR: 50.24.0.0/14
NetName: SUDDE-NETBLK-2010
NetHandle: NET-50-24-0-0-1
Parent: NET50 (NET-50-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Optimum (SUDDE)
RegDate: 2010-10-25
Updated: 2012-03-20
Ref: https://rdap.arin.net/registry/ip/50.24.0.0
OrgName: Optimum
OrgId: SUDDE
Address: 311 NNW Loop 323
City: Tyler
StateProv: TX
PostalCode: 75701
Country: US
RegDate: 2006-05-25
Updated: 2025-08-06
Ref: https://rdap.arin.net/registry/entity/SUDDE
OrgTechHandle: AUIO-ARIN
OrgTechName: Altice USA Internet Operations
OrgTechPhone: +1-516-803-2300
OrgTechEmail: hostmaster@cv.net
OrgTechRef: https://rdap.arin.net/registry/entity/AUIO-ARIN
OrgNOCHandle: NOCSU37-ARIN
OrgNOCName: NOC Suddenlink
OrgNOCPhone: +1-866-232-5455
OrgNOCEmail: hostmaster@cv.net
OrgNOCRef: https://rdap.arin.net/registry/entity/NOCSU37-ARIN
OrgAbuseHandle: ABUSE6997-ARIN
OrgAbuseName: Abuse Suddenlink
OrgAbusePhone: +1-903-266-4800
OrgAbuseEmail: abuse@suddenlink.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE6997-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.26.175.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36100
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.26.175.199. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033000 1800 900 604800 86400
;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 16:18:44 CST 2026
;; MSG SIZE rcvd: 106
Host 199.175.26.50.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 199.175.26.50.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 94.180.247.20 | attackspambots | $f2bV_matches |
2020-06-20 03:56:23 |
| 144.217.60.239 | attackspambots | The IP has triggered Cloudflare WAF. CF-Ray: 5a5be09b7fdc3f9f | WAF_Rule_ID: torfallback | WAF_Kind: firewall | CF_Action: challenge | Country: T1 | CF_IPClass: tor | Protocol: HTTP/1.1 | Method: GET | Host: wevg.org | User-Agent: Mozilla/5.0 (Linux; Android 9; SM-N960F) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.89 Mobile Safari/537.36 | CF_DC: YUL. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2020-06-20 03:58:43 |
| 79.181.104.188 | attackbots | Email rejected due to spam filtering |
2020-06-20 04:10:48 |
| 49.88.112.75 | attack | Failed password for root from 49.88.112.75 port 18825 ssh2 Failed password for root from 49.88.112.75 port 18825 ssh2 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.75 user=root Failed password for root from 49.88.112.75 port 29937 ssh2 Failed password for root from 49.88.112.75 port 29937 ssh2 |
2020-06-20 04:02:42 |
| 91.121.221.195 | attack | Unauthorised connection attempt detected at AUO FR1 NODE2. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-06-20 03:59:29 |
| 220.250.48.128 | attack | bad bot |
2020-06-20 04:01:51 |
| 223.16.15.88 | attackbotsspam | Unauthorized connection attempt detected from IP address 223.16.15.88 to port 445 |
2020-06-20 04:29:09 |
| 190.111.239.144 | attackspambots |
|
2020-06-20 04:09:21 |
| 148.235.82.68 | attackspambots | prod6 ... |
2020-06-20 04:06:30 |
| 111.231.32.127 | attackspam | "Unauthorized connection attempt on SSHD detected" |
2020-06-20 04:16:27 |
| 89.144.47.246 | attackspambots |
|
2020-06-20 04:26:11 |
| 116.121.119.103 | attack | 2020-06-19T20:31:27.895516centos sshd[4304]: Invalid user write from 116.121.119.103 port 51044 2020-06-19T20:31:29.759090centos sshd[4304]: Failed password for invalid user write from 116.121.119.103 port 51044 ssh2 2020-06-19T20:39:43.566447centos sshd[4738]: Invalid user nat from 116.121.119.103 port 37056 ... |
2020-06-20 04:03:56 |
| 162.243.138.207 | attack | 162.243.138.207 - - \[19/Jun/2020:20:36:09 +0200\] "GET / HTTP/1.1" 403 135 "-" "Mozilla/5.0 zgrab/0.x" ... |
2020-06-20 04:34:58 |
| 128.199.123.0 | attack | Invalid user zhanghw from 128.199.123.0 port 49086 |
2020-06-20 03:59:09 |
| 188.170.13.225 | attackbots | Jun 19 22:15:38 mail sshd[14572]: Failed password for invalid user kai from 188.170.13.225 port 49230 ssh2 ... |
2020-06-20 04:32:35 |