Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nanning

Region: Guangxi

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: No.31,Jin-rong Street

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.8.50.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60683
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;116.8.50.134.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Aug 03 02:42:41 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 134.50.8.116.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 134.50.8.116.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
132.232.47.41 attackbots
Invalid user broke from 132.232.47.41 port 48932
2019-08-23 16:36:47
37.187.46.74 attackspambots
Aug 23 03:08:03 ny01 sshd[5237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.46.74
Aug 23 03:08:06 ny01 sshd[5237]: Failed password for invalid user share from 37.187.46.74 port 47806 ssh2
Aug 23 03:14:35 ny01 sshd[5820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.46.74
2019-08-23 16:52:14
119.196.83.10 attackspambots
Invalid user iesse from 119.196.83.10 port 52080
2019-08-23 16:39:29
49.156.214.202 attack
Invalid user cosmos from 49.156.214.202 port 58252
2019-08-23 16:50:51
183.230.146.26 attack
Invalid user admin from 183.230.146.26 port 54816
2019-08-23 17:02:58
221.162.255.70 attackbots
Invalid user gis from 221.162.255.70 port 35566
2019-08-23 16:54:56
202.155.234.28 attack
Invalid user administrator from 202.155.234.28 port 15901
2019-08-23 16:58:47
165.227.131.210 attackbotsspam
Invalid user readonly from 165.227.131.210 port 36718
2019-08-23 17:06:27
91.98.45.103 attack
Invalid user java from 91.98.45.103 port 38426
2019-08-23 16:43:43
54.154.167.0 attackspambots
Invalid user kd from 54.154.167.0 port 50143
2019-08-23 16:46:44
113.91.35.147 attack
Invalid user vicent from 113.91.35.147 port 22357
2019-08-23 16:40:19
206.81.8.14 attackbotsspam
2019-08-23T07:51:01.024436hub.schaetter.us sshd\[16357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.8.14  user=root
2019-08-23T07:51:02.886117hub.schaetter.us sshd\[16357\]: Failed password for root from 206.81.8.14 port 40490 ssh2
2019-08-23T07:55:04.529925hub.schaetter.us sshd\[16373\]: Invalid user teamspeak from 206.81.8.14
2019-08-23T07:55:04.562507hub.schaetter.us sshd\[16373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.8.14
2019-08-23T07:55:06.449344hub.schaetter.us sshd\[16373\]: Failed password for invalid user teamspeak from 206.81.8.14 port 35200 ssh2
...
2019-08-23 16:58:02
134.209.157.165 attack
[portscan] tcp/22 [SSH]
*(RWIN=65535)(08231048)
2019-08-23 16:36:07
202.28.110.173 attack
Invalid user installer from 202.28.110.173 port 54147
2019-08-23 16:59:56
157.230.13.28 attackbots
Invalid user kiacobucci from 157.230.13.28 port 36208
2019-08-23 16:31:57

Recently Reported IPs

61.248.45.194 43.245.150.95 159.41.122.14 19.211.180.14
88.87.47.17 144.136.234.97 192.97.117.12 61.2.157.109
201.162.15.254 178.176.105.179 92.51.125.26 57.235.3.169
103.226.153.48 141.64.134.120 1.179.146.53 13.24.61.38
12.219.227.100 83.127.96.11 104.15.76.237 216.234.4.250