Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Chicago

Region: Illinois

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Comcast Cable Communications, LLC

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.77.134.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23706
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;50.77.134.86.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040600 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Apr 06 15:29:44 +08 2019
;; MSG SIZE  rcvd: 116

Host info
86.134.77.50.in-addr.arpa domain name pointer 50-77-134-86-static.hfc.comcastbusiness.net.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
86.134.77.50.in-addr.arpa	name = 50-77-134-86-static.hfc.comcastbusiness.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
115.76.25.125 attack
115.76.25.125 - - [18/Oct/2019:07:37:27 -0400] "GET /?page=../../../../etc/passwd&action=view&manufacturerID=143&productID=9300&linkID=7489&duplicate=0 HTTP/1.1" 200 16652 "https://exitdevice.com/?page=../../../../etc/passwd&action=view&manufacturerID=143&productID=9300&linkID=7489&duplicate=0" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0"
...
2019-10-19 00:35:46
192.42.116.24 attack
Oct 18 18:01:26 rotator sshd\[26821\]: Failed password for root from 192.42.116.24 port 36640 ssh2Oct 18 18:01:29 rotator sshd\[26821\]: Failed password for root from 192.42.116.24 port 36640 ssh2Oct 18 18:01:31 rotator sshd\[26821\]: Failed password for root from 192.42.116.24 port 36640 ssh2Oct 18 18:01:34 rotator sshd\[26821\]: Failed password for root from 192.42.116.24 port 36640 ssh2Oct 18 18:01:37 rotator sshd\[26821\]: Failed password for root from 192.42.116.24 port 36640 ssh2Oct 18 18:01:39 rotator sshd\[26821\]: Failed password for root from 192.42.116.24 port 36640 ssh2
...
2019-10-19 00:13:47
220.133.98.95 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/220.133.98.95/ 
 TW - 1H : (163)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 220.133.98.95 
 
 CIDR : 220.133.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 6 
  3H - 22 
  6H - 39 
 12H - 87 
 24H - 158 
 
 DateTime : 2019-10-18 13:37:45 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-19 00:26:59
104.248.159.69 attackbots
Oct 18 01:52:40 hanapaa sshd\[11388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.159.69  user=root
Oct 18 01:52:42 hanapaa sshd\[11388\]: Failed password for root from 104.248.159.69 port 60282 ssh2
Oct 18 01:57:33 hanapaa sshd\[11793\]: Invalid user ubuntu from 104.248.159.69
Oct 18 01:57:33 hanapaa sshd\[11793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.159.69
Oct 18 01:57:34 hanapaa sshd\[11793\]: Failed password for invalid user ubuntu from 104.248.159.69 port 43380 ssh2
2019-10-19 00:01:33
1.10.141.117 attackspam
Automatic report - Port Scan Attack
2019-10-19 00:02:17
216.126.228.10 attackbots
port scan and connect, tcp 80 (http)
2019-10-19 00:10:12
222.186.173.238 attackspam
10/18/2019-11:55:55.152040 222.186.173.238 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-18 23:58:00
203.91.118.180 attackspam
Firewall-block on port: 1701, 500, 4500
2019-10-19 00:32:53
58.240.218.198 attackspam
SSH invalid-user multiple login attempts
2019-10-19 00:36:24
222.186.175.182 attackspambots
Oct 18 17:59:57 arianus sshd\[14519\]: Unable to negotiate with 222.186.175.182 port 62186: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 \[preauth\]
...
2019-10-19 00:00:22
190.28.121.159 attackbotsspam
2019-10-14 00:48:04,784 fail2ban.actions        [843]: NOTICE  [sshd] Ban 190.28.121.159
2019-10-14 03:52:55,066 fail2ban.actions        [843]: NOTICE  [sshd] Ban 190.28.121.159
2019-10-14 07:02:12,172 fail2ban.actions        [843]: NOTICE  [sshd] Ban 190.28.121.159
...
2019-10-19 00:35:13
154.118.141.90 attackspam
Oct 18 15:56:25 hosting sshd[6373]: Invalid user purple123 from 154.118.141.90 port 41691
...
2019-10-19 00:32:25
179.218.192.123 attackbots
port scan and connect, tcp 23 (telnet)
2019-10-18 23:55:07
111.231.66.135 attackspambots
Oct 18 08:17:44 plusreed sshd[8905]: Invalid user tureen from 111.231.66.135
...
2019-10-19 00:03:11
27.77.40.91 attackbotsspam
Automatic report - Port Scan Attack
2019-10-19 00:02:52

Recently Reported IPs

103.89.91.221 150.107.215.207 37.49.224.128 183.82.254.22
180.243.80.171 142.11.218.227 110.5.101.38 124.123.85.151
219.131.182.106 14.244.107.57 210.212.249.228 200.75.225.62
178.197.234.77 58.187.54.192 196.29.33.74 94.176.76.56
68.183.124.53 201.243.88.206 190.109.68.222 178.128.166.154