Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 71.34.196.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43009
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;71.34.196.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 00:19:25 CST 2025
;; MSG SIZE  rcvd: 105
Host info
50.196.34.71.in-addr.arpa domain name pointer 71-34-196-50.ksca.qwest.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.196.34.71.in-addr.arpa	name = 71-34-196-50.ksca.qwest.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
161.35.161.107 attackspambots
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-08-02 06:21:18
91.134.173.100 attack
2020-08-01T21:53:17.081100shield sshd\[19406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.173.100  user=root
2020-08-01T21:53:19.017361shield sshd\[19406\]: Failed password for root from 91.134.173.100 port 38534 ssh2
2020-08-01T21:56:58.739613shield sshd\[20039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.173.100  user=root
2020-08-01T21:57:00.681041shield sshd\[20039\]: Failed password for root from 91.134.173.100 port 49060 ssh2
2020-08-01T22:00:44.423110shield sshd\[21544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.173.100  user=root
2020-08-02 06:30:56
31.220.2.133 attackbotsspam
Malicious brute force vulnerability hacking attacks
2020-08-02 06:35:00
122.51.77.128 attackspam
Invalid user ansible from 122.51.77.128 port 58800
2020-08-02 06:27:07
116.55.248.214 attackspam
Aug  1 22:35:34 rocket sshd[7929]: Failed password for root from 116.55.248.214 port 49380 ssh2
Aug  1 22:38:11 rocket sshd[8213]: Failed password for root from 116.55.248.214 port 42900 ssh2
...
2020-08-02 06:46:15
117.69.189.152 attackspam
Aug  2 00:26:59 srv01 postfix/smtpd\[27882\]: warning: unknown\[117.69.189.152\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  2 00:27:10 srv01 postfix/smtpd\[27882\]: warning: unknown\[117.69.189.152\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  2 00:27:27 srv01 postfix/smtpd\[27882\]: warning: unknown\[117.69.189.152\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  2 00:27:47 srv01 postfix/smtpd\[27882\]: warning: unknown\[117.69.189.152\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  2 00:27:59 srv01 postfix/smtpd\[27882\]: warning: unknown\[117.69.189.152\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-02 06:48:03
106.124.137.103 attackspam
Aug  2 00:34:04 vps1 sshd[11336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.137.103  user=root
Aug  2 00:34:06 vps1 sshd[11336]: Failed password for invalid user root from 106.124.137.103 port 48616 ssh2
Aug  2 00:35:33 vps1 sshd[11357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.137.103  user=root
Aug  2 00:35:35 vps1 sshd[11357]: Failed password for invalid user root from 106.124.137.103 port 55112 ssh2
Aug  2 00:38:42 vps1 sshd[11413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.137.103  user=root
Aug  2 00:38:44 vps1 sshd[11413]: Failed password for invalid user root from 106.124.137.103 port 39897 ssh2
Aug  2 00:40:20 vps1 sshd[11498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.137.103  user=root
...
2020-08-02 06:43:42
110.87.25.124 attack
$f2bV_matches
2020-08-02 06:28:19
51.83.125.8 attackspambots
Aug  1 22:48:18 rocket sshd[9913]: Failed password for root from 51.83.125.8 port 39062 ssh2
Aug  1 22:52:15 rocket sshd[10531]: Failed password for root from 51.83.125.8 port 49872 ssh2
...
2020-08-02 06:31:17
107.13.186.21 attack
SSH Invalid Login
2020-08-02 06:15:41
106.12.38.231 attackspam
Aug  2 00:14:55 marvibiene sshd[24840]: Failed password for root from 106.12.38.231 port 44508 ssh2
Aug  2 00:16:46 marvibiene sshd[24914]: Failed password for root from 106.12.38.231 port 35604 ssh2
2020-08-02 06:18:42
35.184.235.107 attackspambots
Muieblackcat Scanner Remote Code Injection Vulnerability
2020-08-02 06:17:19
51.195.28.120 attack
Aug  1 22:47:35 fhem-rasp sshd[8602]: Disconnected from 51.195.28.120 port 60434 [preauth]
...
2020-08-02 06:37:02
170.254.226.100 attackspam
SSH Invalid Login
2020-08-02 06:40:16
91.121.176.34 attackspambots
Aug  1 23:16:11 nextcloud sshd\[9181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.176.34  user=root
Aug  1 23:16:13 nextcloud sshd\[9181\]: Failed password for root from 91.121.176.34 port 50186 ssh2
Aug  1 23:53:43 nextcloud sshd\[14317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.176.34  user=root
2020-08-02 06:15:08

Recently Reported IPs

62.111.6.163 33.202.248.253 25.36.214.253 56.134.253.146
43.36.160.205 4.34.102.165 224.110.223.202 202.195.111.11
83.182.12.101 240.3.83.30 201.252.56.67 239.127.71.133
202.196.100.92 146.172.215.135 211.117.224.232 116.138.193.224
133.75.128.144 238.153.88.19 227.77.29.30 187.94.182.139