Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.126.48.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15926
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.126.48.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 06:23:58 CST 2025
;; MSG SIZE  rcvd: 105
Host info
50.48.126.68.in-addr.arpa domain name pointer adsl-68-126-48-50.dsl.irvnca.pacbell.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.48.126.68.in-addr.arpa	name = adsl-68-126-48-50.dsl.irvnca.pacbell.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
129.213.133.225 attackspambots
Brute force SMTP login attempted.
...
2019-08-10 08:54:28
41.190.36.210 attackspambots
Aug 10 01:19:00 ms-srv sshd[59376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.190.36.210
Aug 10 01:19:01 ms-srv sshd[59376]: Failed password for invalid user hera from 41.190.36.210 port 33685 ssh2
2019-08-10 09:31:51
129.226.57.237 attackbotsspam
Brute force SMTP login attempted.
...
2019-08-10 08:46:34
72.141.239.7 attack
Aug  9 21:14:12 www1 sshd\[27241\]: Invalid user mki from 72.141.239.7Aug  9 21:14:14 www1 sshd\[27241\]: Failed password for invalid user mki from 72.141.239.7 port 39526 ssh2Aug  9 21:17:28 www1 sshd\[27648\]: Invalid user tele from 72.141.239.7Aug  9 21:17:30 www1 sshd\[27648\]: Failed password for invalid user tele from 72.141.239.7 port 54212 ssh2Aug  9 21:20:52 www1 sshd\[28102\]: Invalid user hn from 72.141.239.7Aug  9 21:20:55 www1 sshd\[28102\]: Failed password for invalid user hn from 72.141.239.7 port 40676 ssh2
...
2019-08-10 09:29:54
185.119.81.50 attackbotsspam
Automatic report - Banned IP Access
2019-08-10 09:25:02
1.54.54.116 attackspam
Automatic report - Port Scan Attack
2019-08-10 09:34:15
77.158.196.146 attackspam
RDP Bruteforce
2019-08-10 08:51:16
178.128.24.129 attack
Aug 10 01:34:37 dedicated sshd[13701]: Invalid user tranz from 178.128.24.129 port 53658
2019-08-10 09:37:19
74.82.47.10 attack
Honeypot attack, port: 445, PTR: scan-09b.shadowserver.org.
2019-08-10 09:13:43
129.211.106.144 attack
Brute force SMTP login attempted.
...
2019-08-10 09:04:26
101.95.105.74 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2019-08-10 08:50:49
129.211.115.33 attackspam
Brute force SMTP login attempted.
...
2019-08-10 09:02:55
190.218.183.206 attackspam
Honeypot attack, port: 5555, PTR: PTR record not found
2019-08-10 08:59:53
159.65.2.58 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-08-10 08:56:25
189.114.189.199 attackspambots
2019-08-09T20:36:16.242008abusebot-4.cloudsearch.cf sshd\[18431\]: Invalid user kristal from 189.114.189.199 port 31058
2019-08-10 08:50:13

Recently Reported IPs

142.89.239.25 214.33.50.146 51.181.191.89 16.189.145.196
53.210.108.131 121.14.123.241 224.25.188.2 179.249.51.104
25.53.26.61 167.53.74.104 79.126.33.75 225.245.129.254
19.134.183.113 224.133.155.60 179.138.163.117 216.176.128.249
121.155.85.63 43.178.65.171 36.4.137.108 55.16.29.46