Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.4.12.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59161
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;58.4.12.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 01:20:44 CST 2025
;; MSG SIZE  rcvd: 103
Host info
50.12.4.58.in-addr.arpa domain name pointer 58x4x12x50.ap58.ftth.ucom.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.12.4.58.in-addr.arpa	name = 58x4x12x50.ap58.ftth.ucom.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
85.239.35.130 attack
 TCP (SYN) 85.239.35.130:3196 -> port 1080, len 60
2020-09-08 13:40:06
184.168.152.108 attack
Automatic report - XMLRPC Attack
2020-09-08 14:28:42
114.5.103.178 attackspambots
Email rejected due to spam filtering
2020-09-08 14:11:10
180.127.93.84 attackspam
Email rejected due to spam filtering
2020-09-08 14:06:28
218.92.0.145 attack
2020-09-08T05:28:59.667939abusebot-2.cloudsearch.cf sshd[12016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145  user=root
2020-09-08T05:29:02.147191abusebot-2.cloudsearch.cf sshd[12016]: Failed password for root from 218.92.0.145 port 56227 ssh2
2020-09-08T05:29:05.763033abusebot-2.cloudsearch.cf sshd[12016]: Failed password for root from 218.92.0.145 port 56227 ssh2
2020-09-08T05:28:59.667939abusebot-2.cloudsearch.cf sshd[12016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145  user=root
2020-09-08T05:29:02.147191abusebot-2.cloudsearch.cf sshd[12016]: Failed password for root from 218.92.0.145 port 56227 ssh2
2020-09-08T05:29:05.763033abusebot-2.cloudsearch.cf sshd[12016]: Failed password for root from 218.92.0.145 port 56227 ssh2
2020-09-08T05:28:59.667939abusebot-2.cloudsearch.cf sshd[12016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rho
...
2020-09-08 13:36:28
177.220.174.187 attackspambots
Sep  8 08:19:44 abendstille sshd\[19321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.220.174.187  user=root
Sep  8 08:19:46 abendstille sshd\[19321\]: Failed password for root from 177.220.174.187 port 52434 ssh2
Sep  8 08:24:41 abendstille sshd\[23891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.220.174.187  user=root
Sep  8 08:24:43 abendstille sshd\[23891\]: Failed password for root from 177.220.174.187 port 1313 ssh2
Sep  8 08:29:20 abendstille sshd\[28223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.220.174.187  user=root
...
2020-09-08 14:31:09
218.75.156.247 attack
$f2bV_matches
2020-09-08 14:08:42
106.12.165.53 attackspambots
Jul  8 09:22:28 server sshd[19804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.165.53
Jul  8 09:22:29 server sshd[19804]: Failed password for invalid user zoro from 106.12.165.53 port 58776 ssh2
Jul  8 10:27:17 server sshd[23614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.165.53
Jul  8 10:27:18 server sshd[23614]: Failed password for invalid user steaua from 106.12.165.53 port 44710 ssh2
2020-09-08 14:33:49
80.114.130.156 attack
DATE:2020-09-08 05:22:20, IP:80.114.130.156, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-09-08 14:26:17
187.35.129.125 attackspam
Sep  8 06:24:54 root sshd[17638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.35.129.125 
Sep  8 06:37:43 root sshd[30753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.35.129.125 
...
2020-09-08 14:20:15
129.204.113.241 attackspam
Sep  8 06:28:42 root sshd[21585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.113.241 
...
2020-09-08 14:35:22
120.132.6.27 attackbotsspam
Sep  8 07:18:11 root sshd[7795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.6.27 
...
2020-09-08 14:17:43
222.186.173.226 attackspam
Sep  8 07:29:33 ns308116 sshd[13265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226  user=root
Sep  8 07:29:35 ns308116 sshd[13265]: Failed password for root from 222.186.173.226 port 63485 ssh2
Sep  8 07:29:38 ns308116 sshd[13265]: Failed password for root from 222.186.173.226 port 63485 ssh2
Sep  8 07:29:41 ns308116 sshd[13265]: Failed password for root from 222.186.173.226 port 63485 ssh2
Sep  8 07:29:44 ns308116 sshd[13265]: Failed password for root from 222.186.173.226 port 63485 ssh2
...
2020-09-08 14:30:00
147.135.133.88 attack
...
2020-09-08 14:20:37
202.129.41.94 attackspambots
Sep  7 18:51:59 ns382633 sshd\[9972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.129.41.94  user=root
Sep  7 18:52:02 ns382633 sshd\[9972\]: Failed password for root from 202.129.41.94 port 52040 ssh2
Sep  7 18:52:13 ns382633 sshd\[10018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.129.41.94  user=root
Sep  7 18:52:15 ns382633 sshd\[10018\]: Failed password for root from 202.129.41.94 port 53710 ssh2
Sep  7 18:52:37 ns382633 sshd\[10038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.129.41.94  user=root
2020-09-08 14:26:47

Recently Reported IPs

143.31.7.199 96.11.5.196 55.91.12.19 87.134.191.185
205.105.141.224 55.226.153.80 29.21.51.127 125.154.133.141
168.163.214.249 56.67.95.225 98.195.135.193 47.205.205.71
31.55.222.166 88.163.182.69 70.2.131.57 19.252.52.100
171.49.169.45 97.195.129.3 247.169.100.169 204.18.15.253