Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Oneida

Region: New York

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Charter Communications Inc

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.75.113.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13120
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;50.75.113.207.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061901 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 20 16:39:02 CST 2019
;; MSG SIZE  rcvd: 117
Host info
207.113.75.50.in-addr.arpa domain name pointer rrcs-50-75-113-207.nys.biz.rr.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
207.113.75.50.in-addr.arpa	name = rrcs-50-75-113-207.nys.biz.rr.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
1.202.115.29 attackspambots
Mar 17 18:16:01 cumulus sshd[13586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.202.115.29  user=r.r
Mar 17 18:16:03 cumulus sshd[13586]: Failed password for r.r from 1.202.115.29 port 48385 ssh2
Mar 17 18:16:03 cumulus sshd[13586]: Received disconnect from 1.202.115.29 port 48385:11: Bye Bye [preauth]
Mar 17 18:16:03 cumulus sshd[13586]: Disconnected from 1.202.115.29 port 48385 [preauth]
Mar 17 18:23:34 cumulus sshd[14117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.202.115.29  user=r.r
Mar 17 18:23:37 cumulus sshd[14117]: Failed password for r.r from 1.202.115.29 port 64097 ssh2
Mar 17 18:23:37 cumulus sshd[14117]: Received disconnect from 1.202.115.29 port 64097:11: Bye Bye [preauth]
Mar 17 18:23:37 cumulus sshd[14117]: Disconnected from 1.202.115.29 port 64097 [preauth]
Mar 17 18:25:53 cumulus sshd[14211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ........
-------------------------------
2020-03-19 04:43:55
119.76.37.91 attack
Honeypot attack, port: 81, PTR: cm-119-76-37-91.revip17.asianet.co.th.
2020-03-19 04:58:51
45.236.129.53 attack
Mar 18 17:30:48 ws26vmsma01 sshd[143017]: Failed password for root from 45.236.129.53 port 34394 ssh2
...
2020-03-19 04:29:28
122.202.48.251 attackbotsspam
Invalid user newyork from 122.202.48.251 port 38758
2020-03-19 04:28:09
14.29.192.160 attackbotsspam
Mar 18 14:01:05 OPSO sshd\[24767\]: Invalid user ssh from 14.29.192.160 port 39081
Mar 18 14:01:05 OPSO sshd\[24767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.192.160
Mar 18 14:01:06 OPSO sshd\[24767\]: Failed password for invalid user ssh from 14.29.192.160 port 39081 ssh2
Mar 18 14:05:50 OPSO sshd\[25752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.192.160  user=root
Mar 18 14:05:52 OPSO sshd\[25752\]: Failed password for root from 14.29.192.160 port 36838 ssh2
2020-03-19 04:42:32
69.229.6.34 attackbots
Mar 18 13:56:04 game-panel sshd[23473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.34
Mar 18 13:56:06 game-panel sshd[23473]: Failed password for invalid user mikel from 69.229.6.34 port 47704 ssh2
Mar 18 14:04:30 game-panel sshd[23926]: Failed password for root from 69.229.6.34 port 44480 ssh2
2020-03-19 04:47:15
106.13.54.106 attackspambots
Mar 18 20:28:41 vlre-nyc-1 sshd\[18524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.54.106  user=root
Mar 18 20:28:43 vlre-nyc-1 sshd\[18524\]: Failed password for root from 106.13.54.106 port 17636 ssh2
Mar 18 20:31:25 vlre-nyc-1 sshd\[18590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.54.106  user=root
Mar 18 20:31:26 vlre-nyc-1 sshd\[18590\]: Failed password for root from 106.13.54.106 port 2257 ssh2
Mar 18 20:34:09 vlre-nyc-1 sshd\[18663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.54.106  user=root
...
2020-03-19 04:34:28
103.220.72.117 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-19 05:02:52
37.247.40.122 attackspambots
trying to access non-authorized port
2020-03-19 04:39:07
223.171.32.66 attackspambots
Too many connections or unauthorized access detected from Arctic banned ip
2020-03-19 05:04:20
198.245.55.145 attackbotsspam
198.245.55.145 - - [18/Mar/2020:19:02:53 +0100] "GET /wp-login.php HTTP/1.1" 200 6582 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
198.245.55.145 - - [18/Mar/2020:19:02:54 +0100] "POST /wp-login.php HTTP/1.1" 200 7362 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
198.245.55.145 - - [18/Mar/2020:19:02:55 +0100] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-03-19 04:57:10
122.144.134.27 attackspam
Mar 18 14:05:42 plex sshd[31478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.144.134.27  user=root
Mar 18 14:05:44 plex sshd[31478]: Failed password for root from 122.144.134.27 port 3220 ssh2
2020-03-19 04:49:36
222.186.30.35 attack
2020-03-18T21:49:40.299327vps751288.ovh.net sshd\[17743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
2020-03-18T21:49:42.627292vps751288.ovh.net sshd\[17743\]: Failed password for root from 222.186.30.35 port 20053 ssh2
2020-03-18T21:49:45.122857vps751288.ovh.net sshd\[17743\]: Failed password for root from 222.186.30.35 port 20053 ssh2
2020-03-18T21:49:47.362121vps751288.ovh.net sshd\[17743\]: Failed password for root from 222.186.30.35 port 20053 ssh2
2020-03-18T21:52:45.916416vps751288.ovh.net sshd\[17806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
2020-03-19 04:56:50
103.108.87.187 attackspambots
SSH Brute-Force Attack
2020-03-19 04:59:23
95.88.76.66 attackspambots
Honeypot attack, port: 81, PTR: PTR record not found
2020-03-19 04:36:26

Recently Reported IPs

81.99.199.146 178.137.17.11 198.216.233.114 114.67.56.71
39.69.71.200 20.166.90.200 122.252.250.250 37.94.238.164
114.230.122.43 119.53.211.64 197.3.7.157 66.158.210.171
129.120.110.245 49.86.196.153 157.230.178.246 220.78.222.139
123.143.245.224 143.146.145.187 113.161.186.193 197.136.180.126