Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.55.104.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20520
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.55.104.52.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020400 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 04 15:08:28 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 52.104.55.50.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.104.55.50.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.215.6.11 attack
Aug 24 06:53:00 OPSO sshd\[11649\]: Invalid user qq from 62.215.6.11 port 35005
Aug 24 06:53:00 OPSO sshd\[11649\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.215.6.11
Aug 24 06:53:02 OPSO sshd\[11649\]: Failed password for invalid user qq from 62.215.6.11 port 35005 ssh2
Aug 24 06:56:55 OPSO sshd\[12582\]: Invalid user wangjie from 62.215.6.11 port 35549
Aug 24 06:56:55 OPSO sshd\[12582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.215.6.11
2020-08-24 13:03:44
218.92.0.247 attackspam
Aug 24 06:22:58 eventyay sshd[5921]: Failed password for root from 218.92.0.247 port 8713 ssh2
Aug 24 06:23:11 eventyay sshd[5921]: error: maximum authentication attempts exceeded for root from 218.92.0.247 port 8713 ssh2 [preauth]
Aug 24 06:23:18 eventyay sshd[5924]: Failed password for root from 218.92.0.247 port 36838 ssh2
...
2020-08-24 12:28:59
222.186.52.86 attackbots
Aug 24 06:46:07 v22018053744266470 sshd[15420]: Failed password for root from 222.186.52.86 port 16245 ssh2
Aug 24 06:48:36 v22018053744266470 sshd[15604]: Failed password for root from 222.186.52.86 port 41201 ssh2
...
2020-08-24 12:57:19
167.114.115.33 attackbotsspam
2020-08-24T07:49:56.406533lavrinenko.info sshd[14829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.115.33
2020-08-24T07:49:56.401509lavrinenko.info sshd[14829]: Invalid user python from 167.114.115.33 port 33638
2020-08-24T07:49:58.001557lavrinenko.info sshd[14829]: Failed password for invalid user python from 167.114.115.33 port 33638 ssh2
2020-08-24T07:54:00.843274lavrinenko.info sshd[14930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.115.33  user=root
2020-08-24T07:54:02.935143lavrinenko.info sshd[14930]: Failed password for root from 167.114.115.33 port 40844 ssh2
...
2020-08-24 13:03:02
103.219.112.1 attackbots
Port Scan
...
2020-08-24 12:33:57
103.76.175.130 attackspam
bruteforce detected
2020-08-24 13:01:01
192.99.11.195 attackbotsspam
SSH bruteforce
2020-08-24 12:52:17
188.166.185.236 attack
Aug 24 05:56:30 santamaria sshd\[10285\]: Invalid user murai from 188.166.185.236
Aug 24 05:56:30 santamaria sshd\[10285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.185.236
Aug 24 05:56:32 santamaria sshd\[10285\]: Failed password for invalid user murai from 188.166.185.236 port 58467 ssh2
...
2020-08-24 12:30:58
141.98.10.196 attackspam
22/tcp 22/tcp 22/tcp...
[2020-07-15/08-23]924pkt,1pt.(tcp)
2020-08-24 12:37:45
62.210.206.78 attack
Aug 24 05:56:08 ip40 sshd[28249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.206.78 
Aug 24 05:56:10 ip40 sshd[28249]: Failed password for invalid user sql from 62.210.206.78 port 35660 ssh2
...
2020-08-24 12:51:30
165.22.186.178 attack
2020-08-24T07:43:16.828913mail.standpoint.com.ua sshd[13836]: Invalid user rom from 165.22.186.178 port 58274
2020-08-24T07:43:16.832467mail.standpoint.com.ua sshd[13836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.186.178
2020-08-24T07:43:16.828913mail.standpoint.com.ua sshd[13836]: Invalid user rom from 165.22.186.178 port 58274
2020-08-24T07:43:18.517570mail.standpoint.com.ua sshd[13836]: Failed password for invalid user rom from 165.22.186.178 port 58274 ssh2
2020-08-24T07:46:58.873217mail.standpoint.com.ua sshd[14358]: Invalid user wum from 165.22.186.178 port 37388
...
2020-08-24 12:53:27
202.158.62.240 attackspambots
srv02 Mass scanning activity detected Target: 19528  ..
2020-08-24 12:54:40
138.99.6.184 attackbotsspam
Automatic report BANNED IP
2020-08-24 12:55:11
222.186.173.238 attack
Aug 24 06:35:01 melroy-server sshd[333]: Failed password for root from 222.186.173.238 port 2808 ssh2
Aug 24 06:35:05 melroy-server sshd[333]: Failed password for root from 222.186.173.238 port 2808 ssh2
...
2020-08-24 12:51:59
120.92.109.187 attackbots
Aug 24 03:55:51 scw-tender-jepsen sshd[31546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.109.187
Aug 24 03:55:53 scw-tender-jepsen sshd[31546]: Failed password for invalid user teamspeak3 from 120.92.109.187 port 25846 ssh2
2020-08-24 12:58:55

Recently Reported IPs

180.171.133.18 125.152.122.213 11.184.239.31 175.223.30.206
237.135.85.178 120.48.99.101 221.98.166.64 231.80.165.168
98.239.69.220 217.230.172.230 112.6.83.157 42.49.189.67
228.87.10.18 138.70.6.193 176.234.57.68 88.130.170.208
43.164.91.214 103.244.248.88 117.200.79.235 106.219.55.39