Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.136.50.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12440
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.136.50.22.			IN	A

;; AUTHORITY SECTION:
.			11	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024092601 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 27 03:38:46 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 22.50.136.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 22.50.136.113.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
138.68.1.18 attack
Sep  6 06:29:21 MK-Soft-VM4 sshd\[30132\]: Invalid user qwe123 from 138.68.1.18 port 42442
Sep  6 06:29:21 MK-Soft-VM4 sshd\[30132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.1.18
Sep  6 06:29:24 MK-Soft-VM4 sshd\[30132\]: Failed password for invalid user qwe123 from 138.68.1.18 port 42442 ssh2
...
2019-09-06 14:45:10
41.214.20.60 attackspambots
Sep  6 08:42:57 core sshd[29427]: Invalid user gpadmin from 41.214.20.60 port 36573
Sep  6 08:42:58 core sshd[29427]: Failed password for invalid user gpadmin from 41.214.20.60 port 36573 ssh2
...
2019-09-06 14:58:26
146.164.21.68 attack
Sep  6 02:31:34 ny01 sshd[701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.164.21.68
Sep  6 02:31:36 ny01 sshd[701]: Failed password for invalid user vbox from 146.164.21.68 port 50345 ssh2
Sep  6 02:36:59 ny01 sshd[1729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.164.21.68
2019-09-06 14:51:18
92.222.75.80 attack
Sep  6 09:41:34 server sshd\[13154\]: Invalid user test123 from 92.222.75.80 port 34457
Sep  6 09:41:34 server sshd\[13154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.75.80
Sep  6 09:41:36 server sshd\[13154\]: Failed password for invalid user test123 from 92.222.75.80 port 34457 ssh2
Sep  6 09:45:46 server sshd\[25500\]: Invalid user vnc123 from 92.222.75.80 port 56494
Sep  6 09:45:46 server sshd\[25500\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.75.80
2019-09-06 14:49:02
92.222.71.125 attackspambots
Jun 28 05:35:28 Server10 sshd[21546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.71.125
Jun 28 05:35:30 Server10 sshd[21546]: Failed password for invalid user student8 from 92.222.71.125 port 34534 ssh2
Jun 28 05:38:10 Server10 sshd[23718]: Invalid user admin from 92.222.71.125 port 37310
Jun 28 05:38:10 Server10 sshd[23718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.71.125
Jun 28 05:38:12 Server10 sshd[23718]: Failed password for invalid user admin from 92.222.71.125 port 37310 ssh2
2019-09-06 15:27:30
92.222.72.234 attack
Sep  2 10:01:58 Server10 sshd[28562]: Failed password for invalid user college from 92.222.72.234 port 47441 ssh2
Sep  2 10:06:56 Server10 sshd[9956]: Failed password for invalid user 1q2w3e4r from 92.222.72.234 port 41303 ssh2
Sep  2 10:11:57 Server10 sshd[18125]: Failed password for invalid user diradmin from 92.222.72.234 port 35156 ssh2
Sep  2 10:16:47 Server10 sshd[31594]: Failed password for invalid user pc1 from 92.222.72.234 port 57233 ssh2
Sep  2 10:21:33 Server10 sshd[7846]: Failed password for invalid user jking from 92.222.72.234 port 51078 ssh2
Sep  2 10:26:38 Server10 sshd[21171]: Failed password for invalid user qwerty from 92.222.72.234 port 44921 ssh2
Sep  2 10:31:42 Server10 sshd[2360]: Failed password for invalid user danb from 92.222.72.234 port 38770 ssh2
Sep  2 10:36:28 Server10 sshd[10978]: Failed password for invalid user tst from 92.222.72.234 port 60847 ssh2
Sep  2 10:41:17 Server10 sshd[23938]: Failed password for invalid user azerty from 92.222.72.234 port 54692 ssh2
2019-09-06 15:18:02
218.98.40.154 attack
Sep  5 20:33:41 friendsofhawaii sshd\[5693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.154  user=root
Sep  5 20:33:43 friendsofhawaii sshd\[5693\]: Failed password for root from 218.98.40.154 port 44662 ssh2
Sep  5 20:33:51 friendsofhawaii sshd\[5703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.154  user=root
Sep  5 20:33:53 friendsofhawaii sshd\[5703\]: Failed password for root from 218.98.40.154 port 59512 ssh2
Sep  5 20:34:00 friendsofhawaii sshd\[5721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.154  user=root
2019-09-06 14:59:43
191.36.203.228 attack
Automatic report - Port Scan Attack
2019-09-06 15:17:10
80.82.54.218 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-06 03:47:42,573 INFO [amun_request_handler] PortScan Detected on Port: 445 (80.82.54.218)
2019-09-06 15:25:26
191.253.29.111 attackspam
Sep  5 23:55:46 web1 postfix/smtpd[23013]: warning: unknown[191.253.29.111]: SASL PLAIN authentication failed: authentication failure
...
2019-09-06 15:05:22
113.160.226.117 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-06 03:51:45,243 INFO [amun_request_handler] PortScan Detected on Port: 445 (113.160.226.117)
2019-09-06 15:08:08
35.134.247.210 attackspam
Sep  6 08:32:39 OPSO sshd\[30460\]: Invalid user webadmin from 35.134.247.210 port 60176
Sep  6 08:32:39 OPSO sshd\[30460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.134.247.210
Sep  6 08:32:41 OPSO sshd\[30460\]: Failed password for invalid user webadmin from 35.134.247.210 port 60176 ssh2
Sep  6 08:39:43 OPSO sshd\[31536\]: Invalid user postgres from 35.134.247.210 port 47644
Sep  6 08:39:43 OPSO sshd\[31536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.134.247.210
2019-09-06 14:50:33
142.93.254.124 attackbotsspam
Sep  5 21:16:42 php1 sshd\[1600\]: Invalid user student3 from 142.93.254.124
Sep  5 21:16:42 php1 sshd\[1600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.254.124
Sep  5 21:16:44 php1 sshd\[1600\]: Failed password for invalid user student3 from 142.93.254.124 port 44824 ssh2
Sep  5 21:21:18 php1 sshd\[2099\]: Invalid user odoo from 142.93.254.124
Sep  5 21:21:18 php1 sshd\[2099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.254.124
2019-09-06 15:27:04
140.116.161.244 attackbotsspam
2019-09-06T06:04:06.356560abusebot-2.cloudsearch.cf sshd\[23083\]: Invalid user vbox from 140.116.161.244 port 37092
2019-09-06 14:45:41
221.132.17.81 attack
Sep  6 09:06:18 core sshd[24256]: Invalid user ftptest from 221.132.17.81 port 41606
Sep  6 09:06:20 core sshd[24256]: Failed password for invalid user ftptest from 221.132.17.81 port 41606 ssh2
...
2019-09-06 15:22:10

Recently Reported IPs

113.136.204.114 113.136.159.22 113.136.237.235 113.136.86.154
113.136.244.121 113.135.9.244 113.136.206.226 113.136.6.159
113.194.132.147 113.194.140.217 113.194.14.134 113.194.175.76
113.194.15.240 113.194.183.20 113.194.168.203 113.194.188.86
113.194.202.56 113.194.26.164 113.194.200.58 113.194.237.76