Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tsuen Wan

Region: Tsuen Wan New Territories

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       50.7.0.0 - 50.7.255.255
CIDR:           50.7.0.0/16
NetName:        FDCSERVERS
NetHandle:      NET-50-7-0-0-1
Parent:         NET50 (NET-50-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   FDCservers.net (FDCSE)
RegDate:        2010-10-18
Updated:        2018-10-12
Ref:            https://rdap.arin.net/registry/ip/50.7.0.0


OrgName:        FDCservers.net
OrgId:          FDCSE
Address:        175 Main St. #1363
City:           Destin
StateProv:      FL
PostalCode:     32540
Country:        US
RegDate:        2003-05-20
Updated:        2025-08-08
Ref:            https://rdap.arin.net/registry/entity/FDCSE

ReferralServer:  rwhois://rwhois.fdcservers.net:4321

OrgNOCHandle: NETWO10401-ARIN
OrgNOCName:   Network Department
OrgNOCPhone:  +1-312-423-6675 
OrgNOCEmail:  network@fdcservers.net
OrgNOCRef:    https://rdap.arin.net/registry/entity/NETWO10401-ARIN

OrgTechHandle: NETWO10401-ARIN
OrgTechName:   Network Department
OrgTechPhone:  +1-312-423-6675 
OrgTechEmail:  network@fdcservers.net
OrgTechRef:    https://rdap.arin.net/registry/entity/NETWO10401-ARIN

OrgRoutingHandle: NETWO10401-ARIN
OrgRoutingName:   Network Department
OrgRoutingPhone:  +1-312-423-6675 
OrgRoutingEmail:  network@fdcservers.net
OrgRoutingRef:    https://rdap.arin.net/registry/entity/NETWO10401-ARIN

OrgAbuseHandle: ABUSE438-ARIN
OrgAbuseName:   ABUSE department
OrgAbusePhone:  +1-312-423-6675 
OrgAbuseEmail:  abuse@fdcservers.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE438-ARIN

# end


# start

NetRange:       50.7.250.0 - 50.7.251.255
CIDR:           50.7.250.0/23
NetName:        FDCSERVERS-HONGKONG
NetHandle:      NET-50-7-250-0-1
Parent:         FDCSERVERS (NET-50-7-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   FDCservers.net (FDCSE-28)
RegDate:        2019-10-14
Updated:        2021-11-19
Ref:            https://rdap.arin.net/registry/ip/50.7.250.0


OrgName:        FDCservers.net
OrgId:          FDCSE-28
Address:        3 Shing Yiu Street
City:           Tsuen Wan
StateProv:      KWAI CHUNG
PostalCode:     999077
Country:        HK
RegDate:        2019-10-14
Updated:        2025-08-08
Ref:            https://rdap.arin.net/registry/entity/FDCSE-28


OrgTechHandle: NETWO10401-ARIN
OrgTechName:   Network Department
OrgTechPhone:  +1-312-423-6675 
OrgTechEmail:  network@fdcservers.net
OrgTechRef:    https://rdap.arin.net/registry/entity/NETWO10401-ARIN

OrgNOCHandle: NETWO10401-ARIN
OrgNOCName:   Network Department
OrgNOCPhone:  +1-312-423-6675 
OrgNOCEmail:  network@fdcservers.net
OrgNOCRef:    https://rdap.arin.net/registry/entity/NETWO10401-ARIN

OrgAbuseHandle: ABUSE438-ARIN
OrgAbuseName:   ABUSE department
OrgAbusePhone:  +1-312-423-6675 
OrgAbuseEmail:  abuse@fdcservers.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE438-ARIN

OrgRoutingHandle: NETWO10401-ARIN
OrgRoutingName:   Network Department
OrgRoutingPhone:  +1-312-423-6675 
OrgRoutingEmail:  network@fdcservers.net
OrgRoutingRef:    https://rdap.arin.net/registry/entity/NETWO10401-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.fdcservers.net:4321.

%rwhois V-1.5:003fff:00 rwhois.fdcservers.net (by Network Solutions, Inc. V-1.5.9.6)
network:Auth-Area:50.7.0.0/16
network:Class-Name:network
network:OrgName:FDCservers.net
network:OrgID;I:FDCSE
network:Address:141 W Jackson Blvd. #1135
network:City:Chicago
network:StateProv:IL
network:PostalCode:60604
network:Country:US
network:NetRange:50.7.0.0 - 50.7.255.255
network:CIDR:50.7.0.0/16
network:NetName:FDCSERVERS
network:OrgAbuseHandle:ABUSE438-ARIN
network:OrgAbuseName:Abuse Department
network:OrgAbusePhone:+1-312-423-6675
network:OrgAbuseEmail:abuse@fdcservers.net
network:OrgNOCHandle:ABUSE438-ARIN
network:OrgNOCName:Tech Support
network:OrgNOCPhone:+1-312-423-6675
network:OrgNOCEmail:abuse@fdcservers.net
network:OrgTechHandle:ABUSE438-ARIN
network:OrgTechName:Tech Support
network:OrgTechPhone:+1-312-423-6675
network:OrgTechEmail:abuse@fdcservers.net

%ok
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.7.250.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1506
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.7.250.164.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110300 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 03 22:19:17 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 164.250.7.50.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.250.7.50.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
129.144.183.126 attackbotsspam
Jun 23 06:07:15 localhost sshd[18981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.144.183.126
Jun 23 06:07:16 localhost sshd[18981]: Failed password for invalid user joel from 129.144.183.126 port 51561 ssh2
Jun 23 06:13:22 localhost sshd[19109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.144.183.126
Jun 23 06:13:23 localhost sshd[19109]: Failed password for invalid user ubuntu from 129.144.183.126 port 54483 ssh2
...
2019-06-23 18:19:30
2001:8d8:871:6d00::11:e07 attackspam
WP Authentication failure
2019-06-23 17:29:06
81.22.45.251 attack
¯\_(ツ)_/¯
2019-06-23 18:32:00
80.98.135.121 attack
Jun 23 11:58:40 raspberrypi sshd\[7782\]: Invalid user seeb from 80.98.135.121 port 46604
Jun 23 11:58:40 raspberrypi sshd\[7782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.98.135.121
Jun 23 11:58:42 raspberrypi sshd\[7782\]: Failed password for invalid user seeb from 80.98.135.121 port 46604 ssh2
Jun 23 12:05:54 raspberrypi sshd\[7856\]: Invalid user adm from 80.98.135.121 port 57150
Jun 23 12:05:54 raspberrypi sshd\[7856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.98.135.121
...
2019-06-23 18:09:01
46.105.99.163 attack
SS1,DEF GET /admin/login.php
2019-06-23 18:15:50
223.241.163.43 attackspambots
Jun 23 01:43:27 mxgate1 postfix/postscreen[27811]: CONNECT from [223.241.163.43]:58910 to [176.31.12.44]:25
Jun 23 01:43:27 mxgate1 postfix/dnsblog[27874]: addr 223.241.163.43 listed by domain zen.spamhaus.org as 127.0.0.4
Jun 23 01:43:27 mxgate1 postfix/dnsblog[27874]: addr 223.241.163.43 listed by domain zen.spamhaus.org as 127.0.0.11
Jun 23 01:43:27 mxgate1 postfix/dnsblog[27875]: addr 223.241.163.43 listed by domain cbl.abuseat.org as 127.0.0.2
Jun 23 01:43:33 mxgate1 postfix/postscreen[27811]: DNSBL rank 3 for [223.241.163.43]:58910
Jun x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=223.241.163.43
2019-06-23 17:58:39
168.227.134.245 attack
SMTP-sasl brute force
...
2019-06-23 18:24:08
202.79.167.44 attackspam
Unauthorized connection attempt from IP address 202.79.167.44 on Port 445(SMB)
2019-06-23 18:12:41
132.232.32.228 attackspam
Jun 23 08:54:05 lnxmail61 sshd[6064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.32.228
Jun 23 08:54:05 lnxmail61 sshd[6064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.32.228
2019-06-23 17:28:44
35.237.32.44 attackbotsspam
35.237.32.44 - - \[23/Jun/2019:12:05:28 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
35.237.32.44 - - \[23/Jun/2019:12:05:28 +0200\] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
35.237.32.44 - - \[23/Jun/2019:12:05:29 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
35.237.32.44 - - \[23/Jun/2019:12:05:29 +0200\] "POST /wp-login.php HTTP/1.1" 200 1607 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
35.237.32.44 - - \[23/Jun/2019:12:05:30 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
35.237.32.44 - - \[23/Jun/2019:12:05:30 +0200\] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/
2019-06-23 18:22:27
68.183.181.7 attackspam
Jun 23 10:04:04 localhost sshd\[43423\]: Invalid user hun from 68.183.181.7 port 54848
Jun 23 10:04:04 localhost sshd\[43423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.181.7
Jun 23 10:04:06 localhost sshd\[43423\]: Failed password for invalid user hun from 68.183.181.7 port 54848 ssh2
Jun 23 10:05:26 localhost sshd\[43460\]: Invalid user simone from 68.183.181.7 port 40700
Jun 23 10:05:26 localhost sshd\[43460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.181.7
...
2019-06-23 18:20:50
51.254.210.53 attack
Jan 24 09:44:08 vtv3 sshd\[32611\]: Invalid user alcione from 51.254.210.53 port 50962
Jan 24 09:44:08 vtv3 sshd\[32611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.210.53
Jan 24 09:44:10 vtv3 sshd\[32611\]: Failed password for invalid user alcione from 51.254.210.53 port 50962 ssh2
Jan 24 09:48:03 vtv3 sshd\[1437\]: Invalid user sa from 51.254.210.53 port 53240
Jan 24 09:48:03 vtv3 sshd\[1437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.210.53
Feb  2 17:09:00 vtv3 sshd\[11489\]: Invalid user MELSEC from 51.254.210.53 port 53388
Feb  2 17:09:00 vtv3 sshd\[11489\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.210.53
Feb  2 17:09:02 vtv3 sshd\[11489\]: Failed password for invalid user MELSEC from 51.254.210.53 port 53388 ssh2
Feb  2 17:13:08 vtv3 sshd\[12754\]: Invalid user abuild from 51.254.210.53 port 57222
Feb  2 17:13:08 vtv3 sshd\[12754\]: pam
2019-06-23 18:14:13
84.3.2.59 attackbots
Jun 23 12:05:13 dev sshd\[1528\]: Invalid user ld from 84.3.2.59 port 50306
Jun 23 12:05:13 dev sshd\[1528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.3.2.59
...
2019-06-23 18:19:51
117.4.35.64 attackspambots
Unauthorized connection attempt from IP address 117.4.35.64 on Port 445(SMB)
2019-06-23 18:31:08
34.94.202.33 attack
RDP Brute-Force (Grieskirchen RZ1)
2019-06-23 17:51:49

Recently Reported IPs

192.165.198.152 2003:d2:1f4a:5200:d5e1:6a61:fb4a:b189 96.32.221.33 111.27.5.234
60.13.138.138 180.153.236.95 180.153.236.56 180.153.236.181
91.92.242.241 66.249.75.232 95.67.78.182 199.246.88.52
147.185.133.113 34.140.63.209 190.96.18.65 31.40.167.155
20.221.66.246 40.124.168.253 178.128.89.25 98.88.36.180