Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.7.105.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48006
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.7.105.18.			IN	A

;; AUTHORITY SECTION:
.			565	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 17:51:06 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 18.105.7.50.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.105.7.50.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.95.168.59 attackspambots
Brute force SMTP login attempted.
...
2020-04-07 02:06:40
192.99.57.32 attack
2020-04-06T17:11:37.219207shield sshd\[28220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=32.ip-192-99-57.net  user=root
2020-04-06T17:11:39.570368shield sshd\[28220\]: Failed password for root from 192.99.57.32 port 34894 ssh2
2020-04-06T17:15:36.830716shield sshd\[29038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=32.ip-192-99-57.net  user=root
2020-04-06T17:15:38.664745shield sshd\[29038\]: Failed password for root from 192.99.57.32 port 45020 ssh2
2020-04-06T17:19:29.901598shield sshd\[29881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=32.ip-192-99-57.net  user=root
2020-04-07 01:35:59
122.51.68.102 attack
Apr  1 09:48:04 meumeu sshd[10163]: Failed password for root from 122.51.68.102 port 42964 ssh2
Apr  1 09:52:19 meumeu sshd[10626]: Failed password for root from 122.51.68.102 port 58508 ssh2
...
2020-04-07 01:46:36
92.63.194.94 attackbots
Apr  6 19:44:31 silence02 sshd[31925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.94
Apr  6 19:44:33 silence02 sshd[31925]: Failed password for invalid user admin from 92.63.194.94 port 39049 ssh2
Apr  6 19:44:47 silence02 sshd[31982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.94
2020-04-07 01:47:12
80.240.100.24 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-07 01:59:49
177.84.4.135 attackbotsspam
Automatic report - Port Scan Attack
2020-04-07 01:46:03
79.173.124.48 attackspambots
" "
2020-04-07 01:37:13
180.71.47.198 attack
Apr  6 19:08:42 host sshd[19601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.71.47.198  user=root
Apr  6 19:08:44 host sshd[19601]: Failed password for root from 180.71.47.198 port 42958 ssh2
...
2020-04-07 02:11:16
134.122.81.145 attack
"GET /wp-includes/wlwmanifest.xml HTTP/1.1" 404
"GET /xmlrpc.php?rsd HTTP/1.1" 403
"GET /blog/wp-includes/wlwmanifest.xml HTTP/1.1" 404
"GET /web/wp-includes/wlwmanifest.xml HTTP/1.1" 404
2020-04-07 02:02:32
190.113.157.155 attack
SSH login attempts.
2020-04-07 02:05:43
95.163.118.126 attack
Apr  6 17:35:38 ns3164893 sshd[15911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.163.118.126  user=root
Apr  6 17:35:40 ns3164893 sshd[15911]: Failed password for root from 95.163.118.126 port 55910 ssh2
...
2020-04-07 01:55:01
118.24.129.251 attackspambots
Apr  6 17:31:33 hell sshd[24579]: Failed password for root from 118.24.129.251 port 52152 ssh2
...
2020-04-07 01:54:43
125.124.143.62 attack
Apr  7 00:26:24 webhost01 sshd[607]: Failed password for root from 125.124.143.62 port 36108 ssh2
...
2020-04-07 01:56:05
222.186.173.201 attackspam
Apr  6 13:44:05 NPSTNNYC01T sshd[24077]: Failed password for root from 222.186.173.201 port 40432 ssh2
Apr  6 13:44:08 NPSTNNYC01T sshd[24077]: Failed password for root from 222.186.173.201 port 40432 ssh2
Apr  6 13:44:12 NPSTNNYC01T sshd[24077]: Failed password for root from 222.186.173.201 port 40432 ssh2
Apr  6 13:44:18 NPSTNNYC01T sshd[24077]: error: maximum authentication attempts exceeded for root from 222.186.173.201 port 40432 ssh2 [preauth]
...
2020-04-07 01:49:14
138.68.233.59 attack
$f2bV_matches
2020-04-07 01:52:38

Recently Reported IPs

50.41.21.67 50.65.224.108 50.62.30.223 50.7.251.66
50.7.72.139 50.96.73.252 50.84.17.138 50.87.193.205
51.107.184.18 51.103.31.64 51.104.197.128 50.83.161.69
51.124.213.10 51.103.78.83 51.13.97.116 51.116.181.171
51.140.72.209 51.15.147.188 51.140.53.58 51.15.148.105