Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Beaverton

Region: Oregon

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Frontier Communications of America, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.53.218.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26853
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;50.53.218.30.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jun 03 19:27:01 CST 2019
;; MSG SIZE  rcvd: 116

Host info
30.218.53.50.in-addr.arpa domain name pointer static-50-53-218-30.bvtn.or.frontiernet.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
30.218.53.50.in-addr.arpa	name = static-50-53-218-30.bvtn.or.frontiernet.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
198.98.51.63 attack
CloudCIX Reconnaissance Scan Detected, PTR: .
2020-05-23 02:36:35
106.12.17.107 attack
May 22 14:36:02 vps687878 sshd\[3809\]: Invalid user rek from 106.12.17.107 port 54994
May 22 14:36:02 vps687878 sshd\[3809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.17.107
May 22 14:36:04 vps687878 sshd\[3809\]: Failed password for invalid user rek from 106.12.17.107 port 54994 ssh2
May 22 14:40:30 vps687878 sshd\[4522\]: Invalid user zca from 106.12.17.107 port 57410
May 22 14:40:30 vps687878 sshd\[4522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.17.107
...
2020-05-23 02:18:56
156.213.167.226 attack
May 22 13:48:58 ns381471 sshd[8221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.213.167.226
May 22 13:49:00 ns381471 sshd[8221]: Failed password for invalid user admin from 156.213.167.226 port 38273 ssh2
2020-05-23 02:40:50
61.164.246.45 attack
May 22 14:02:43 srv-ubuntu-dev3 sshd[61486]: Invalid user tzx from 61.164.246.45
May 22 14:02:43 srv-ubuntu-dev3 sshd[61486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.164.246.45
May 22 14:02:43 srv-ubuntu-dev3 sshd[61486]: Invalid user tzx from 61.164.246.45
May 22 14:02:45 srv-ubuntu-dev3 sshd[61486]: Failed password for invalid user tzx from 61.164.246.45 port 37804 ssh2
May 22 14:06:35 srv-ubuntu-dev3 sshd[62193]: Invalid user pdz from 61.164.246.45
May 22 14:06:35 srv-ubuntu-dev3 sshd[62193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.164.246.45
May 22 14:06:35 srv-ubuntu-dev3 sshd[62193]: Invalid user pdz from 61.164.246.45
May 22 14:06:37 srv-ubuntu-dev3 sshd[62193]: Failed password for invalid user pdz from 61.164.246.45 port 50562 ssh2
May 22 14:10:06 srv-ubuntu-dev3 sshd[62756]: Invalid user lnz from 61.164.246.45
...
2020-05-23 02:32:06
220.130.81.34 attackbotsspam
SIP/5060 Probe, BF, Hack -
2020-05-23 02:04:07
210.97.40.36 attack
May 22 16:20:16 mail sshd[13237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.97.40.36 
May 22 16:20:18 mail sshd[13237]: Failed password for invalid user hfz from 210.97.40.36 port 60532 ssh2
...
2020-05-23 02:37:56
198.20.87.98 attackbotsspam
Unauthorized connection attempt detected from IP address 198.20.87.98 to port 5601
2020-05-23 02:39:44
95.216.20.54 attack
20 attempts against mh-misbehave-ban on pluto
2020-05-23 02:02:27
95.153.67.14 attackspam
Unauthorised access (May 22) SRC=95.153.67.14 LEN=52 PREC=0x20 TTL=118 ID=24976 DF TCP DPT=445 WINDOW=8192 SYN
2020-05-23 02:04:37
209.65.68.190 attackbots
2020-05-22T13:12:26.396024sorsha.thespaminator.com sshd[22575]: Invalid user tvx from 209.65.68.190 port 55190
2020-05-22T13:12:28.375487sorsha.thespaminator.com sshd[22575]: Failed password for invalid user tvx from 209.65.68.190 port 55190 ssh2
...
2020-05-23 02:39:27
139.99.54.20 attack
Lines containing failures of 139.99.54.20
May 22 13:52:23 shared09 sshd[4439]: Invalid user nfn from 139.99.54.20 port 41096
May 22 13:52:23 shared09 sshd[4439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.54.20
May 22 13:52:25 shared09 sshd[4439]: Failed password for invalid user nfn from 139.99.54.20 port 41096 ssh2
May 22 13:52:26 shared09 sshd[4439]: Received disconnect from 139.99.54.20 port 41096:11: Bye Bye [preauth]
May 22 13:52:26 shared09 sshd[4439]: Disconnected from invalid user nfn 139.99.54.20 port 41096 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=139.99.54.20
2020-05-23 02:06:38
42.101.44.158 attackbotsspam
(sshd) Failed SSH login from 42.101.44.158 (CN/China/-): 5 in the last 3600 secs
2020-05-23 02:05:37
205.185.123.139 attackbotsspam
Unauthorized connection attempt detected from IP address 205.185.123.139 to port 22
2020-05-23 02:07:50
123.206.14.58 attackspam
May 22 20:11:13 amit sshd\[16050\]: Invalid user vuj from 123.206.14.58
May 22 20:11:13 amit sshd\[16050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.14.58
May 22 20:11:16 amit sshd\[16050\]: Failed password for invalid user vuj from 123.206.14.58 port 34759 ssh2
...
2020-05-23 02:20:35
212.47.232.148 attackbotsspam
SIP/5060 Probe, BF, Hack -
2020-05-23 02:14:15

Recently Reported IPs

27.8.6.216 46.160.224.95 94.252.118.122 177.134.240.27
121.245.117.164 117.197.89.166 181.118.109.202 163.203.131.175
156.75.121.3 95.215.240.156 178.135.58.111 27.34.111.3
183.82.116.100 108.92.156.125 98.125.50.33 125.57.246.90
2001:41d0:8:697b:: 50.223.143.126 209.245.238.74 5.113.68.75