Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Turkey

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
109.236.50.211 attackbotsspam
2020-07-21 15:18:15
109.236.50.201 attackspam
2020-07-20 14:39:49
109.236.50.220 attackspambots
2020-07-19 13:42:31
109.236.50.200 attackspambots
2020-07-17 15:00:29
109.236.50.218 attackspam
2020-06-16 12:11:35
109.236.50.49 attackspambots
Sep 14 03:28:39 mxgate1 postfix/postscreen[11771]: CONNECT from [109.236.50.49]:38520 to [176.31.12.44]:25
Sep 14 03:28:39 mxgate1 postfix/dnsblog[11882]: addr 109.236.50.49 listed by domain zen.spamhaus.org as 127.0.0.3
Sep 14 03:28:39 mxgate1 postfix/dnsblog[11884]: addr 109.236.50.49 listed by domain b.barracudacentral.org as 127.0.0.2
Sep 14 03:28:45 mxgate1 postfix/postscreen[11771]: DNSBL rank 3 for [109.236.50.49]:38520
Sep x@x
Sep 14 03:28:46 mxgate1 postfix/postscreen[11771]: DISCONNECT [109.236.50.49]:38520


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=109.236.50.49
2019-09-16 10:31:29
109.236.50.237 attack
Brute force attempt
2019-08-29 18:54:46
109.236.50.50 attack
Port Scan: TCP/25
2019-08-24 15:29:59
109.236.50.215 attackbots
Brute force attempt
2019-08-19 10:35:22
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.236.50.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62102
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.236.50.140.			IN	A

;; AUTHORITY SECTION:
.			295	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 88 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 18:19:58 CST 2022
;; MSG SIZE  rcvd: 107
Host info
140.50.236.109.in-addr.arpa domain name pointer 80-65-201-52.ljusnet.se.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.50.236.109.in-addr.arpa	name = 80-65-201-52.ljusnet.se.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
223.71.167.164 attack
Unauthorized connection attempt detected from IP address 223.71.167.164 to port 8098
2020-06-21 21:11:17
223.111.157.138 attack
scans 11 times in preceeding hours on the ports (in chronological order) 1313 2012 2013 2016 2017 2015 2018 2111 2252 2262 2272 resulting in total of 11 scans from 223.64.96.0/12 block.
2020-06-21 21:10:46
46.27.140.1 attack
Jun 21 08:16:20 mail sshd\[44621\]: Invalid user pos from 46.27.140.1
Jun 21 08:16:20 mail sshd\[44621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.27.140.1
...
2020-06-21 21:09:10
14.175.163.204 attackspambots
Unauthorized connection attempt from IP address 14.175.163.204 on Port 445(SMB)
2020-06-21 21:35:19
162.243.135.209 attack
scans once in preceeding hours on the ports (in chronological order) 8086 resulting in total of 51 scans from 162.243.0.0/16 block.
2020-06-21 21:04:23
14.164.237.102 attackspambots
1592743222 - 06/21/2020 14:40:22 Host: 14.164.237.102/14.164.237.102 Port: 445 TCP Blocked
2020-06-21 21:22:47
113.54.156.94 attack
Jun 21 15:19:32 vps639187 sshd\[27932\]: Invalid user adm from 113.54.156.94 port 55202
Jun 21 15:19:32 vps639187 sshd\[27932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.54.156.94
Jun 21 15:19:34 vps639187 sshd\[27932\]: Failed password for invalid user adm from 113.54.156.94 port 55202 ssh2
...
2020-06-21 21:31:46
106.12.197.232 attackbots
Jun 21 08:54:23 NPSTNNYC01T sshd[28142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.197.232
Jun 21 08:54:25 NPSTNNYC01T sshd[28142]: Failed password for invalid user testtest from 106.12.197.232 port 42618 ssh2
Jun 21 08:58:03 NPSTNNYC01T sshd[28453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.197.232
...
2020-06-21 21:08:41
162.243.137.66 attackbots
scans once in preceeding hours on the ports (in chronological order) 63814 resulting in total of 51 scans from 162.243.0.0/16 block.
2020-06-21 20:58:05
162.243.137.42 attackbots
scans once in preceeding hours on the ports (in chronological order) 7547 resulting in total of 51 scans from 162.243.0.0/16 block.
2020-06-21 20:58:18
51.79.68.147 attackspam
no
2020-06-21 21:22:22
162.243.138.182 attackbotsspam
Port scan: Attack repeated for 24 hours
2020-06-21 20:54:11
184.22.114.65 attack
Unauthorized connection attempt from IP address 184.22.114.65 on Port 445(SMB)
2020-06-21 21:18:54
188.163.75.116 attackbotsspam
Unauthorized connection attempt from IP address 188.163.75.116 on Port 445(SMB)
2020-06-21 21:33:23
36.89.25.170 attackspam
Unauthorized connection attempt from IP address 36.89.25.170 on Port 445(SMB)
2020-06-21 21:29:00

Recently Reported IPs

109.236.48.80 109.236.48.86 109.236.52.102 109.236.52.108
109.236.52.104 109.236.52.100 109.236.52.11 109.236.51.210
109.236.51.213 109.236.52.116 109.236.52.110 109.236.52.118
109.236.52.115 109.236.52.12 109.236.52.124 109.236.52.126
109.236.52.128 109.236.52.138 109.236.52.14 109.236.52.130