Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.66.189.250
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44692
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.66.189.250.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 23:31:57 CST 2025
;; MSG SIZE  rcvd: 106
Host info
250.189.66.50.in-addr.arpa domain name pointer S0106b85e712bc726.cg.shawcable.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
250.189.66.50.in-addr.arpa	name = S0106b85e712bc726.cg.shawcable.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
189.110.148.91 attackspambots
Jul  1 01:42:57 *** sshd[15726]: Invalid user corinne from 189.110.148.91
2019-07-01 10:18:40
116.62.217.151 attackbotsspam
Port scan on 1 port(s): 53
2019-07-01 10:30:50
51.68.11.215 attack
Scanning unused Default website or suspicious access to valid sites from IP marked as abusive
2019-07-01 10:28:20
193.169.252.176 attackspambots
Jun 30 21:16:19 web1 postfix/smtpd[26718]: warning: unknown[193.169.252.176]: SASL LOGIN authentication failed: authentication failure
...
2019-07-01 10:10:24
129.204.58.180 attackbotsspam
Jul  1 02:27:05 ns37 sshd[24030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.58.180
Jul  1 02:27:05 ns37 sshd[24030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.58.180
2019-07-01 10:32:41
164.132.213.119 attack
Port scan attempt detected by AWS-CCS, CTS, India
2019-07-01 10:41:50
40.78.155.194 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-01 10:08:28
83.94.206.60 attackbots
$f2bV_matches
2019-07-01 10:29:00
219.157.232.202 attackspambots
2019-07-01T05:51:21.943823enmeeting.mahidol.ac.th sshd\[12686\]: User root from 219.157.232.202 not allowed because not listed in AllowUsers
2019-07-01T05:51:22.072914enmeeting.mahidol.ac.th sshd\[12686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.157.232.202  user=root
2019-07-01T05:51:24.317450enmeeting.mahidol.ac.th sshd\[12686\]: Failed password for invalid user root from 219.157.232.202 port 52417 ssh2
...
2019-07-01 10:05:23
61.160.95.126 attackbots
Brute force attack stopped by firewall
2019-07-01 10:04:58
158.69.222.2 attack
Jul  1 00:51:01 dedicated sshd[306]: Invalid user cr from 158.69.222.2 port 46993
Jul  1 00:51:02 dedicated sshd[306]: Failed password for invalid user cr from 158.69.222.2 port 46993 ssh2
Jul  1 00:51:01 dedicated sshd[306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.222.2
Jul  1 00:51:01 dedicated sshd[306]: Invalid user cr from 158.69.222.2 port 46993
Jul  1 00:51:02 dedicated sshd[306]: Failed password for invalid user cr from 158.69.222.2 port 46993 ssh2
2019-07-01 10:19:10
192.241.154.215 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-07-01 10:21:19
1.255.70.114 attackspam
Brute force attack stopped by firewall
2019-07-01 10:05:51
103.1.93.166 attackspam
Automatic report - Web App Attack
2019-07-01 10:46:45
117.28.68.214 attack
Jun 28 09:16:06 *** sshd[23438]: reveeclipse mapping checking getaddrinfo for 214.68.28.117.broad.np.fj.dynamic.163data.com.cn [117.28.68.214] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 28 09:16:06 *** sshd[23438]: Invalid user admin from 117.28.68.214
Jun 28 09:16:06 *** sshd[23438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.28.68.214 
Jun 28 09:16:08 *** sshd[23438]: Failed password for invalid user admin from 117.28.68.214 port 37455 ssh2
Jun 28 09:16:12 *** sshd[23438]: Failed password for invalid user admin from 117.28.68.214 port 37455 ssh2
Jun 28 09:16:15 *** sshd[23438]: Failed password for invalid user admin from 117.28.68.214 port 37455 ssh2
Jun 28 09:16:18 *** sshd[23438]: Failed password for invalid user admin from 117.28.68.214 port 37455 ssh2
Jun 28 09:16:20 *** sshd[23438]: Failed password for invalid user admin from 117.28.68.214 port 37455 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=117
2019-07-01 10:20:11

Recently Reported IPs

172.124.47.210 44.154.97.31 4.84.99.156 139.154.53.32
74.240.60.92 231.165.246.27 99.216.159.94 56.126.153.207
179.28.50.44 45.3.249.148 25.127.208.223 211.61.240.189
126.151.79.11 25.199.80.42 161.152.97.60 135.200.215.220
161.154.210.68 54.166.136.230 221.5.158.30 162.164.217.91