Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Icheon-si

Region: Gyeonggi-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 115.145.147.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4958
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;115.145.147.50.			IN	A

;; AUTHORITY SECTION:
.			347	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023060200 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 02 15:14:58 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 50.147.145.115.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.147.145.115.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.234.198.102 attack
Jul  8 08:00:42 giraffe sshd[25761]: Invalid user user1 from 218.234.198.102
Jul  8 08:00:42 giraffe sshd[25761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.234.198.102
Jul  8 08:00:44 giraffe sshd[25761]: Failed password for invalid user user1 from 218.234.198.102 port 37398 ssh2
Jul  8 08:00:45 giraffe sshd[25761]: Received disconnect from 218.234.198.102 port 37398:11: Bye Bye [preauth]
Jul  8 08:00:45 giraffe sshd[25761]: Disconnected from 218.234.198.102 port 37398 [preauth]
Jul  8 08:04:25 giraffe sshd[25780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.234.198.102  user=r.r
Jul  8 08:04:27 giraffe sshd[25780]: Failed password for r.r from 218.234.198.102 port 42638 ssh2
Jul  8 08:04:28 giraffe sshd[25780]: Received disconnect from 218.234.198.102 port 42638:11: Bye Bye [preauth]
Jul  8 08:04:28 giraffe sshd[25780]: Disconnected from 218.234.198.102 port 42638 [preauth........
-------------------------------
2019-07-08 23:33:40
27.153.16.138 attack
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-07-08 23:54:41
58.218.66.199 attack
firewall-block, port(s): 3306/tcp
2019-07-09 00:15:30
213.146.201.240 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 07:49:38,404 INFO [amun_request_handler] PortScan Detected on Port: 445 (213.146.201.240)
2019-07-09 00:39:01
113.178.94.51 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-07 22:23:41,529 INFO [shellcode_manager] (113.178.94.51) no match, writing hexdump (375f7d082be53fab469affe6f5589225 :2222389) - MS17010 (EternalBlue)
2019-07-09 00:34:40
1.28.132.162 attack
Jul  8 15:30:34 localhost postfix/smtpd\[18857\]: warning: unknown\[1.28.132.162\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  8 15:30:43 localhost postfix/smtpd\[19056\]: warning: unknown\[1.28.132.162\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  8 15:30:56 localhost postfix/smtpd\[18857\]: warning: unknown\[1.28.132.162\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  8 15:31:13 localhost postfix/smtpd\[19052\]: warning: unknown\[1.28.132.162\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  8 15:31:22 localhost postfix/smtpd\[19056\]: warning: unknown\[1.28.132.162\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-07-08 23:46:48
104.248.149.9 attackbotsspam
Jul  8 11:46:48 mailrelay sshd[2940]: Invalid user dbuser from 104.248.149.9 port 52598
Jul  8 11:46:48 mailrelay sshd[2940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.149.9
Jul  8 11:46:50 mailrelay sshd[2940]: Failed password for invalid user dbuser from 104.248.149.9 port 52598 ssh2
Jul  8 11:46:51 mailrelay sshd[2940]: Received disconnect from 104.248.149.9 port 52598:11: Bye Bye [preauth]
Jul  8 11:46:51 mailrelay sshd[2940]: Disconnected from 104.248.149.9 port 52598 [preauth]
Jul  8 11:49:16 mailrelay sshd[2944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.149.9  user=mysql
Jul  8 11:49:18 mailrelay sshd[2944]: Failed password for mysql from 104.248.149.9 port 20001 ssh2
Jul  8 11:49:18 mailrelay sshd[2944]: Received disconnect from 104.248.149.9 port 20001:11: Bye Bye [preauth]
Jul  8 11:49:18 mailrelay sshd[2944]: Disconnected from 104.248.149.9 port 20001 ........
-------------------------------
2019-07-08 23:50:31
112.85.42.181 attackbots
Jul  8 16:09:08 vps691689 sshd[28972]: Failed password for root from 112.85.42.181 port 61837 ssh2
Jul  8 16:09:23 vps691689 sshd[28972]: error: maximum authentication attempts exceeded for root from 112.85.42.181 port 61837 ssh2 [preauth]
...
2019-07-08 23:46:04
185.149.66.23 attackbotsspam
proto=tcp  .  spt=49186  .  dpt=3389  .  src=185.149.66.23  .  dst=xx.xx.4.1  .     (listed on     Github Combined on 4 lists )     (318)
2019-07-09 00:26:24
185.220.102.4 attackspam
v+ssh-bruteforce
2019-07-09 00:37:05
64.113.32.29 attackspam
Jul  8 17:05:23 vpn01 sshd\[10796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.113.32.29  user=root
Jul  8 17:05:25 vpn01 sshd\[10796\]: Failed password for root from 64.113.32.29 port 38113 ssh2
Jul  8 17:05:33 vpn01 sshd\[10796\]: Failed password for root from 64.113.32.29 port 38113 ssh2
2019-07-09 00:13:24
217.79.22.101 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 07:53:30,886 INFO [amun_request_handler] PortScan Detected on Port: 445 (217.79.22.101)
2019-07-08 23:43:34
101.255.56.138 attackspambots
Unauthorized IMAP connection attempt.
2019-07-08 23:51:34
75.149.175.180 attackbots
US from 75-149-175-180-washington.hfc.comcastbusiness.net [75.149.175.180]:34224 helo=samson.promolab.com
2019-07-09 00:31:04
106.13.43.242 attackspam
Brute force SMTP login attempted.
...
2019-07-08 23:47:59

Recently Reported IPs

51.82.189.120 255.12.134.35 121.158.155.40 106.123.205.248
243.252.246.55 50.109.39.98 209.149.65.167 74.133.76.249
181.182.7.36 99.81.99.40 196.121.206.53 207.166.69.70
138.52.187.79 62.59.65.123 198.119.147.195 144.160.95.63
185.112.41.33 201.94.158.233 104.246.110.66 223.164.10.10