Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Republic of China (ROC)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
1.163.50.91 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2019-08-18 12:13:49
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.163.50.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18123
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.163.50.145.			IN	A

;; AUTHORITY SECTION:
.			555	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 84 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 06:30:32 CST 2022
;; MSG SIZE  rcvd: 105
Host info
145.50.163.1.in-addr.arpa domain name pointer 1-163-50-145.dynamic-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.50.163.1.in-addr.arpa	name = 1-163-50-145.dynamic-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
1.196.223.50 attackspambots
Mar 17 14:20:28 NPSTNNYC01T sshd[17877]: Failed password for root from 1.196.223.50 port 20185 ssh2
Mar 17 14:21:30 NPSTNNYC01T sshd[17962]: Failed password for root from 1.196.223.50 port 25016 ssh2
...
2020-03-18 02:29:18
43.249.232.58 attackbots
Port probing on unauthorized port 445
2020-03-18 02:20:42
222.186.190.2 attack
2020-03-17T13:59:15.991405xentho-1 sshd[474400]: Failed password for root from 222.186.190.2 port 51986 ssh2
2020-03-17T13:59:11.209759xentho-1 sshd[474400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
2020-03-17T13:59:12.727266xentho-1 sshd[474400]: Failed password for root from 222.186.190.2 port 51986 ssh2
2020-03-17T13:59:15.991405xentho-1 sshd[474400]: Failed password for root from 222.186.190.2 port 51986 ssh2
2020-03-17T13:59:20.968581xentho-1 sshd[474400]: Failed password for root from 222.186.190.2 port 51986 ssh2
2020-03-17T13:59:11.209759xentho-1 sshd[474400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
2020-03-17T13:59:12.727266xentho-1 sshd[474400]: Failed password for root from 222.186.190.2 port 51986 ssh2
2020-03-17T13:59:15.991405xentho-1 sshd[474400]: Failed password for root from 222.186.190.2 port 51986 ssh2
2020-03-17T13:59:20.96
...
2020-03-18 02:00:53
187.189.241.135 attack
5x Failed Password
2020-03-18 01:58:38
60.248.28.105 attackbots
Mar 17 18:02:38 [host] sshd[21508]: pam_unix(sshd:
Mar 17 18:02:40 [host] sshd[21508]: Failed passwor
Mar 17 18:06:35 [host] sshd[21642]: pam_unix(sshd:
2020-03-18 01:55:59
222.186.175.150 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
Failed password for root from 222.186.175.150 port 11626 ssh2
Failed password for root from 222.186.175.150 port 11626 ssh2
Failed password for root from 222.186.175.150 port 11626 ssh2
Failed password for root from 222.186.175.150 port 11626 ssh2
2020-03-18 01:49:13
37.187.101.66 attackspambots
Mar 17 19:15:15 SilenceServices sshd[20843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.101.66
Mar 17 19:15:16 SilenceServices sshd[20843]: Failed password for invalid user jeremiah from 37.187.101.66 port 35906 ssh2
Mar 17 19:23:16 SilenceServices sshd[17024]: Failed password for root from 37.187.101.66 port 33756 ssh2
2020-03-18 02:23:22
41.76.169.43 attackspambots
Mar 17 19:21:54 haigwepa sshd[28116]: Failed password for root from 41.76.169.43 port 55552 ssh2
...
2020-03-18 02:29:02
106.52.32.84 attack
$f2bV_matches
2020-03-18 02:34:36
222.186.180.6 attackbots
Mar 17 19:17:39 vps647732 sshd[4245]: Failed password for root from 222.186.180.6 port 3456 ssh2
Mar 17 19:17:52 vps647732 sshd[4245]: error: maximum authentication attempts exceeded for root from 222.186.180.6 port 3456 ssh2 [preauth]
...
2020-03-18 02:21:36
185.173.35.17 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2020-03-18 02:24:38
182.48.234.227 attack
CMS (WordPress or Joomla) login attempt.
2020-03-18 02:05:43
128.199.128.215 attackspambots
Mar 17 14:20:21 NPSTNNYC01T sshd[17870]: Failed password for root from 128.199.128.215 port 47662 ssh2
Mar 17 14:22:13 NPSTNNYC01T sshd[17988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.128.215
Mar 17 14:22:15 NPSTNNYC01T sshd[17988]: Failed password for invalid user vnc from 128.199.128.215 port 38416 ssh2
...
2020-03-18 02:24:57
186.122.148.216 attack
Mar 17 02:35:40 server sshd\[19119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.148.216  user=root
Mar 17 02:35:42 server sshd\[19119\]: Failed password for root from 186.122.148.216 port 53000 ssh2
Mar 17 13:53:36 server sshd\[8398\]: Invalid user zgl from 186.122.148.216
Mar 17 13:53:36 server sshd\[8398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.148.216 
Mar 17 13:53:38 server sshd\[8398\]: Failed password for invalid user zgl from 186.122.148.216 port 36124 ssh2
...
2020-03-18 01:45:54
122.242.196.148 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-18 02:16:20

Recently Reported IPs

1.163.50.109 1.163.50.152 1.163.50.16 1.163.50.163
1.163.50.168 1.163.50.179 1.163.50.204 1.163.50.240
1.163.50.73 1.163.51.151 1.163.51.165 1.163.51.179
1.163.51.200 1.163.51.208 1.163.51.214 1.163.51.92
1.163.52.127 1.163.52.13 1.163.52.2 1.163.52.200