Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.53.122.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9933
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.53.122.48.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 08:28:29 CST 2022
;; MSG SIZE  rcvd: 105
Host info
48.122.53.50.in-addr.arpa domain name pointer static-50-53-122-48.bvtn.or.ptr.ziplyfiber.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.122.53.50.in-addr.arpa	name = static-50-53-122-48.bvtn.or.ptr.ziplyfiber.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
42.51.156.6 attackspambots
Oct 20 14:04:59 ArkNodeAT sshd\[30544\]: Invalid user Cold@123 from 42.51.156.6
Oct 20 14:04:59 ArkNodeAT sshd\[30544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.156.6
Oct 20 14:05:01 ArkNodeAT sshd\[30544\]: Failed password for invalid user Cold@123 from 42.51.156.6 port 21753 ssh2
2019-10-20 20:53:39
219.137.113.57 attack
$f2bV_matches
2019-10-20 20:58:25
104.200.110.184 attackbots
2019-10-20T12:01:10.863426hub.schaetter.us sshd\[5389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.200.110.184  user=root
2019-10-20T12:01:13.347970hub.schaetter.us sshd\[5389\]: Failed password for root from 104.200.110.184 port 56838 ssh2
2019-10-20T12:05:11.113310hub.schaetter.us sshd\[5413\]: Invalid user yu from 104.200.110.184 port 39428
2019-10-20T12:05:11.120683hub.schaetter.us sshd\[5413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.200.110.184
2019-10-20T12:05:12.356196hub.schaetter.us sshd\[5413\]: Failed password for invalid user yu from 104.200.110.184 port 39428 ssh2
...
2019-10-20 20:49:10
154.209.4.173 attackbots
Oct 20 19:19:51 webhost01 sshd[10883]: Failed password for root from 154.209.4.173 port 54943 ssh2
...
2019-10-20 20:36:05
91.144.21.62 attack
php WP PHPmyadamin ABUSE blocked for 12h
2019-10-20 20:55:00
13.126.222.2 attack
Oct 20 14:04:11 mc1 kernel: \[2859408.683206\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=13.126.222.2 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x20 TTL=235 ID=54321 PROTO=TCP SPT=49420 DPT=6379 WINDOW=65535 RES=0x00 SYN URGP=0 
Oct 20 14:04:23 mc1 kernel: \[2859420.195351\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=13.126.222.2 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x20 TTL=235 ID=54321 PROTO=TCP SPT=53579 DPT=6380 WINDOW=65535 RES=0x00 SYN URGP=0 
Oct 20 14:04:35 mc1 kernel: \[2859432.167812\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=13.126.222.2 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x20 TTL=235 ID=54321 PROTO=TCP SPT=48189 DPT=2375 WINDOW=65535 RES=0x00 SYN URGP=0 
...
2019-10-20 21:12:19
222.186.175.148 attack
Oct 20 09:24:37 firewall sshd[32402]: Failed password for root from 222.186.175.148 port 38302 ssh2
Oct 20 09:24:37 firewall sshd[32402]: error: maximum authentication attempts exceeded for root from 222.186.175.148 port 38302 ssh2 [preauth]
Oct 20 09:24:37 firewall sshd[32402]: Disconnecting: Too many authentication failures [preauth]
...
2019-10-20 20:33:55
202.83.17.223 attack
Oct 20 14:04:43 ArkNodeAT sshd\[30530\]: Invalid user service from 202.83.17.223
Oct 20 14:04:43 ArkNodeAT sshd\[30530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.17.223
Oct 20 14:04:45 ArkNodeAT sshd\[30530\]: Failed password for invalid user service from 202.83.17.223 port 53182 ssh2
2019-10-20 21:00:53
217.125.110.139 attackbotsspam
Oct 20 14:38:36 [host] sshd[13699]: Invalid user cielo from 217.125.110.139
Oct 20 14:38:36 [host] sshd[13699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.125.110.139
Oct 20 14:38:38 [host] sshd[13699]: Failed password for invalid user cielo from 217.125.110.139 port 60320 ssh2
2019-10-20 20:51:23
104.168.140.120 attackspambots
Automatic report - XMLRPC Attack
2019-10-20 20:47:01
142.93.218.34 attackbots
Oct 20 12:58:33 ip-172-31-1-72 sshd\[9351\]: Invalid user matsuo from 142.93.218.34
Oct 20 12:58:33 ip-172-31-1-72 sshd\[9351\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.218.34
Oct 20 12:58:35 ip-172-31-1-72 sshd\[9351\]: Failed password for invalid user matsuo from 142.93.218.34 port 41790 ssh2
Oct 20 13:04:08 ip-172-31-1-72 sshd\[9423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.218.34  user=root
Oct 20 13:04:10 ip-172-31-1-72 sshd\[9423\]: Failed password for root from 142.93.218.34 port 52932 ssh2
2019-10-20 21:06:36
149.56.89.123 attackbotsspam
Oct 20 14:23:57 mout sshd[24547]: Invalid user oozize from 149.56.89.123 port 44291
2019-10-20 20:34:28
222.186.180.9 attackbotsspam
Oct 20 12:53:54 *** sshd[11072]: User root from 222.186.180.9 not allowed because not listed in AllowUsers
2019-10-20 21:03:46
104.248.142.37 attackspam
Fail2Ban Ban Triggered
2019-10-20 21:04:18
91.214.221.231 attackbotsspam
DATE:2019-10-20 14:04:51, IP:91.214.221.231, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2019-10-20 21:03:00

Recently Reported IPs

222.174.233.166 103.70.130.134 88.147.152.237 125.62.218.141
222.113.156.90 182.112.59.0 153.34.121.52 105.185.138.246
120.24.178.155 218.156.125.171 47.88.51.243 131.100.2.118
212.110.92.155 200.201.155.254 177.249.168.235 208.44.156.82
137.184.114.124 41.251.91.231 164.90.232.152 143.244.132.110