Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.50.212.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22961
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.50.212.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 12:02:22 CST 2025
;; MSG SIZE  rcvd: 105
Host info
42.212.50.50.in-addr.arpa domain name pointer 50-50-212-42.waus.wi.frontiernet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.212.50.50.in-addr.arpa	name = 50-50-212-42.waus.wi.frontiernet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
23.94.182.210 attackspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-08-05 19:50:55
159.89.9.140 attackspambots
Automatic report - XMLRPC Attack
2020-08-05 19:37:15
117.173.67.119 attack
Aug  5 07:07:56 inter-technics sshd[13756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.173.67.119  user=root
Aug  5 07:07:58 inter-technics sshd[13756]: Failed password for root from 117.173.67.119 port 3911 ssh2
Aug  5 07:12:04 inter-technics sshd[14167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.173.67.119  user=root
Aug  5 07:12:06 inter-technics sshd[14167]: Failed password for root from 117.173.67.119 port 3912 ssh2
Aug  5 07:16:17 inter-technics sshd[14387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.173.67.119  user=root
Aug  5 07:16:19 inter-technics sshd[14387]: Failed password for root from 117.173.67.119 port 3913 ssh2
...
2020-08-05 19:48:39
154.221.26.222 attack
SSH Brute Force
2020-08-05 19:21:07
37.49.230.14 attackspam
Aug  5 13:36:44 OPSO sshd\[29377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.230.14  user=root
Aug  5 13:36:46 OPSO sshd\[29377\]: Failed password for root from 37.49.230.14 port 54926 ssh2
Aug  5 13:37:03 OPSO sshd\[29395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.230.14  user=root
Aug  5 13:37:05 OPSO sshd\[29395\]: Failed password for root from 37.49.230.14 port 53872 ssh2
Aug  5 13:37:22 OPSO sshd\[29402\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.230.14  user=root
2020-08-05 19:39:26
183.15.88.25 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-05 19:36:48
138.68.178.64 attackbots
Aug  5 13:37:04 PorscheCustomer sshd[13404]: Failed password for root from 138.68.178.64 port 43240 ssh2
Aug  5 13:41:15 PorscheCustomer sshd[13534]: Failed password for root from 138.68.178.64 port 54450 ssh2
...
2020-08-05 19:56:15
5.188.84.119 attack
0,16-02/03 [bc01/m09] PostRequest-Spammer scoring: essen
2020-08-05 19:35:54
39.109.123.214 attackbots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-05 19:53:08
39.107.74.87 attackspam
Unwanted checking 80 or 443 port
...
2020-08-05 19:17:53
202.77.105.98 attackspambots
SSH Brute Force
2020-08-05 19:55:27
120.70.100.2 attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-05 19:17:04
1.20.227.66 attack
Automatic report - Banned IP Access
2020-08-05 19:27:53
115.78.4.219 attack
SSH brutforce
2020-08-05 19:25:53
116.2.171.16 attackspambots
port scan and connect, tcp 23 (telnet)
2020-08-05 19:40:29

Recently Reported IPs

60.93.49.143 8.127.175.22 5.247.235.32 218.140.200.223
189.225.186.110 142.43.223.53 224.251.10.151 62.26.229.44
157.232.89.57 118.41.51.140 175.204.68.37 157.184.153.98
184.195.171.37 181.13.195.14 150.132.33.141 244.26.62.165
124.54.81.72 118.181.115.35 255.74.87.179 206.200.136.5