Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tokyo

Region: Tokyo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       50.7.0.0 - 50.7.255.255
CIDR:           50.7.0.0/16
NetName:        FDCSERVERS
NetHandle:      NET-50-7-0-0-1
Parent:         NET50 (NET-50-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   FDCservers.net (FDCSE)
RegDate:        2010-10-18
Updated:        2018-10-12
Ref:            https://rdap.arin.net/registry/ip/50.7.0.0


OrgName:        FDCservers.net
OrgId:          FDCSE
Address:        175 Main St. #1363
City:           Destin
StateProv:      FL
PostalCode:     32540
Country:        US
RegDate:        2003-05-20
Updated:        2025-08-08
Ref:            https://rdap.arin.net/registry/entity/FDCSE

ReferralServer:  rwhois://rwhois.fdcservers.net:4321

OrgNOCHandle: NETWO10401-ARIN
OrgNOCName:   Network Department
OrgNOCPhone:  +1-312-423-6675 
OrgNOCEmail:  network@fdcservers.net
OrgNOCRef:    https://rdap.arin.net/registry/entity/NETWO10401-ARIN

OrgRoutingHandle: NETWO10401-ARIN
OrgRoutingName:   Network Department
OrgRoutingPhone:  +1-312-423-6675 
OrgRoutingEmail:  network@fdcservers.net
OrgRoutingRef:    https://rdap.arin.net/registry/entity/NETWO10401-ARIN

OrgAbuseHandle: ABUSE438-ARIN
OrgAbuseName:   ABUSE department
OrgAbusePhone:  +1-312-423-6675 
OrgAbuseEmail:  abuse@fdcservers.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE438-ARIN

OrgTechHandle: NETWO10401-ARIN
OrgTechName:   Network Department
OrgTechPhone:  +1-312-423-6675 
OrgTechEmail:  network@fdcservers.net
OrgTechRef:    https://rdap.arin.net/registry/entity/NETWO10401-ARIN

# end


# start

NetRange:       50.7.158.0 - 50.7.159.255
CIDR:           50.7.158.0/23
NetName:        FDCSERVERS-TOKYO
NetHandle:      NET-50-7-158-0-1
Parent:         FDCSERVERS (NET-50-7-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   FDCservers.net (FDCSE-30)
RegDate:        2019-10-14
Updated:        2021-11-19
Ref:            https://rdap.arin.net/registry/ip/50.7.158.0


OrgName:        FDCservers.net
OrgId:          FDCSE-30
Address:        2-1-7 Higashi-shinagawa
City:           Tokyo
StateProv:      SHINAGAWA-KU
PostalCode:     140-0002
Country:        JP
RegDate:        2019-10-14
Updated:        2025-08-08
Ref:            https://rdap.arin.net/registry/entity/FDCSE-30


OrgRoutingHandle: NETWO10401-ARIN
OrgRoutingName:   Network Department
OrgRoutingPhone:  +1-312-423-6675 
OrgRoutingEmail:  network@fdcservers.net
OrgRoutingRef:    https://rdap.arin.net/registry/entity/NETWO10401-ARIN

OrgNOCHandle: NETWO10401-ARIN
OrgNOCName:   Network Department
OrgNOCPhone:  +1-312-423-6675 
OrgNOCEmail:  network@fdcservers.net
OrgNOCRef:    https://rdap.arin.net/registry/entity/NETWO10401-ARIN

OrgTechHandle: NETWO10401-ARIN
OrgTechName:   Network Department
OrgTechPhone:  +1-312-423-6675 
OrgTechEmail:  network@fdcservers.net
OrgTechRef:    https://rdap.arin.net/registry/entity/NETWO10401-ARIN

OrgAbuseHandle: ABUSE438-ARIN
OrgAbuseName:   ABUSE department
OrgAbusePhone:  +1-312-423-6675 
OrgAbuseEmail:  abuse@fdcservers.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE438-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.fdcservers.net:4321.

%rwhois V-1.5:003fff:00 rwhois.fdcservers.net (by Network Solutions, Inc. V-1.5.9.6)
network:Auth-Area:50.7.0.0/16
network:Class-Name:network
network:OrgName:FDCservers.net
network:OrgID;I:FDCSE
network:Address:141 W Jackson Blvd. #1135
network:City:Chicago
network:StateProv:IL
network:PostalCode:60604
network:Country:US
network:NetRange:50.7.0.0 - 50.7.255.255
network:CIDR:50.7.0.0/16
network:NetName:FDCSERVERS
network:OrgAbuseHandle:ABUSE438-ARIN
network:OrgAbuseName:Abuse Department
network:OrgAbusePhone:+1-312-423-6675
network:OrgAbuseEmail:abuse@fdcservers.net
network:OrgNOCHandle:ABUSE438-ARIN
network:OrgNOCName:Tech Support
network:OrgNOCPhone:+1-312-423-6675
network:OrgNOCEmail:abuse@fdcservers.net
network:OrgTechHandle:ABUSE438-ARIN
network:OrgTechName:Tech Support
network:OrgTechPhone:+1-312-423-6675
network:OrgTechEmail:abuse@fdcservers.net

%ok
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.7.158.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32728
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.7.158.114.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040300 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 16:32:25 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 114.158.7.50.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.158.7.50.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
123.127.107.70 attackbotsspam
2020-04-28T12:19:34.682715shield sshd\[14268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.127.107.70  user=root
2020-04-28T12:19:36.830886shield sshd\[14268\]: Failed password for root from 123.127.107.70 port 40560 ssh2
2020-04-28T12:23:50.436543shield sshd\[15034\]: Invalid user testuser from 123.127.107.70 port 53993
2020-04-28T12:23:50.440172shield sshd\[15034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.127.107.70
2020-04-28T12:23:52.397747shield sshd\[15034\]: Failed password for invalid user testuser from 123.127.107.70 port 53993 ssh2
2020-04-29 04:16:51
195.54.160.213 attackspam
firewall-block, port(s): 33392/tcp
2020-04-29 04:17:55
62.33.168.46 attackspam
Apr 28 15:34:25 eventyay sshd[17420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.33.168.46
Apr 28 15:34:27 eventyay sshd[17420]: Failed password for invalid user victor from 62.33.168.46 port 1118 ssh2
Apr 28 15:41:55 eventyay sshd[17788]: Failed password for root from 62.33.168.46 port 43174 ssh2
...
2020-04-29 04:22:17
195.54.167.47 attackspam
04/28/2020-16:48:18.256915 195.54.167.47 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-29 04:50:31
190.95.19.195 attackspambots
Unauthorized connection attempt detected from IP address 190.95.19.195 to port 445
2020-04-29 04:40:09
79.137.34.248 attack
2020-04-28T17:39:01.606751shield sshd\[32011\]: Invalid user noah from 79.137.34.248 port 51203
2020-04-28T17:39:01.610373shield sshd\[32011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=248.ip-79-137-34.eu
2020-04-28T17:39:03.728092shield sshd\[32011\]: Failed password for invalid user noah from 79.137.34.248 port 51203 ssh2
2020-04-28T17:42:12.147146shield sshd\[32570\]: Invalid user cyr from 79.137.34.248 port 50807
2020-04-28T17:42:12.151441shield sshd\[32570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=248.ip-79-137-34.eu
2020-04-29 04:33:12
106.13.99.51 attackspambots
Apr 28 23:30:44 hosting sshd[30665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.99.51
Apr 28 23:30:44 hosting sshd[30665]: Invalid user user from 106.13.99.51 port 33378
Apr 28 23:30:46 hosting sshd[30665]: Failed password for invalid user user from 106.13.99.51 port 33378 ssh2
Apr 28 23:48:17 hosting sshd[32205]: Invalid user ydk from 106.13.99.51 port 46674
...
2020-04-29 04:50:56
50.116.101.52 attackspam
Apr 28 16:01:33 vmd26974 sshd[17319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.116.101.52
Apr 28 16:01:35 vmd26974 sshd[17319]: Failed password for invalid user henk from 50.116.101.52 port 40472 ssh2
...
2020-04-29 04:17:42
178.32.222.86 attackbotsspam
no
2020-04-29 04:31:05
45.5.136.250 attack
SSH login attemps.
2020-04-29 04:15:10
59.188.2.19 attackbotsspam
Apr 28 21:15:43 mail sshd[4501]: Invalid user testuser from 59.188.2.19
Apr 28 21:15:43 mail sshd[4501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.188.2.19
Apr 28 21:15:43 mail sshd[4501]: Invalid user testuser from 59.188.2.19
Apr 28 21:15:45 mail sshd[4501]: Failed password for invalid user testuser from 59.188.2.19 port 49803 ssh2
Apr 28 21:22:16 mail sshd[5377]: Invalid user ava from 59.188.2.19
...
2020-04-29 04:16:22
177.72.92.190 attackspam
Unauthorized connection attempt detected from IP address 177.72.92.190 to port 8080
2020-04-29 04:45:17
115.135.82.250 attackspambots
Tried sshing with brute force.
2020-04-29 04:32:24
193.112.2.1 attackbots
Apr 28 21:43:31 vps58358 sshd\[18186\]: Failed password for root from 193.112.2.1 port 54656 ssh2Apr 28 21:45:02 vps58358 sshd\[18224\]: Invalid user dmb from 193.112.2.1Apr 28 21:45:04 vps58358 sshd\[18224\]: Failed password for invalid user dmb from 193.112.2.1 port 45538 ssh2Apr 28 21:46:40 vps58358 sshd\[18251\]: Invalid user neil from 193.112.2.1Apr 28 21:46:42 vps58358 sshd\[18251\]: Failed password for invalid user neil from 193.112.2.1 port 36422 ssh2Apr 28 21:48:16 vps58358 sshd\[18278\]: Invalid user nginx from 193.112.2.1
...
2020-04-29 04:51:18
222.186.30.167 attackspambots
Apr 28 22:48:09 minden010 sshd[15338]: Failed password for root from 222.186.30.167 port 25402 ssh2
Apr 28 22:48:14 minden010 sshd[15338]: Failed password for root from 222.186.30.167 port 25402 ssh2
Apr 28 22:48:16 minden010 sshd[15338]: Failed password for root from 222.186.30.167 port 25402 ssh2
...
2020-04-29 04:49:36

Recently Reported IPs

202.141.39.29 80.95.207.198 147.226.234.22 20.29.58.2
120.169.152.189 110.78.156.132 2606:4700:10::6816:1701 2606:4700:10::6814:9575
110.77.248.160 2606:4700:10::6816:4942 2606:4700:10::6814:8190 2606:4700:10::6816:1584
2606:4700:10::6816:998 121.234.219.138 2606:4700:10::6816:2140 164.155.74.48
2606:4700:10::ac43:823 109.162.246.59 2606:4700:10::6816:3935 195.178.110.204