Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.221.137.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57276
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.221.137.50.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 02:19:37 CST 2022
;; MSG SIZE  rcvd: 106
Host info
50.137.221.12.in-addr.arpa domain name pointer web10.netsource-one.net.
50.137.221.12.in-addr.arpa domain name pointer netsource-one.com.
50.137.221.12.in-addr.arpa domain name pointer www.nsoit.com.
50.137.221.12.in-addr.arpa domain name pointer www.netsource-one.com.
50.137.221.12.in-addr.arpa domain name pointer nsoit.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.137.221.12.in-addr.arpa	name = netsource-one.com.
50.137.221.12.in-addr.arpa	name = www.nsoit.com.
50.137.221.12.in-addr.arpa	name = www.netsource-one.com.
50.137.221.12.in-addr.arpa	name = nsoit.com.
50.137.221.12.in-addr.arpa	name = web10.netsource-one.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
5.40.41.85 attackspam
Automatic report - Port Scan Attack
2020-04-29 19:13:31
104.248.209.204 attack
$f2bV_matches
2020-04-29 19:20:44
51.91.156.199 attackbots
SSH invalid-user multiple login try
2020-04-29 19:17:41
49.88.112.114 attackbots
Apr 29 00:15:44 php1 sshd\[12878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Apr 29 00:15:46 php1 sshd\[12878\]: Failed password for root from 49.88.112.114 port 63316 ssh2
Apr 29 00:16:40 php1 sshd\[12969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Apr 29 00:16:42 php1 sshd\[12969\]: Failed password for root from 49.88.112.114 port 32444 ssh2
Apr 29 00:17:34 php1 sshd\[13060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
2020-04-29 19:21:42
189.180.170.31 attackbotsspam
Lines containing failures of 189.180.170.31
Apr 29 02:07:29 server-name sshd[7965]: Received disconnect from 189.180.170.31 port 54520:11: Bye Bye [preauth]
Apr 29 02:07:29 server-name sshd[7965]: Disconnected from 189.180.170.31 port 54520 [preauth]
Apr 29 02:11:31 server-name sshd[8163]: Invalid user admin from 189.180.170.31 port 54858
Apr 29 02:11:31 server-name sshd[8163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.180.170.31 
Apr 29 02:11:33 server-name sshd[8163]: Failed password for invalid user admin from 189.180.170.31 port 54858 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=189.180.170.31
2020-04-29 19:19:13
217.173.202.227 attackspam
Telnet Server BruteForce Attack
2020-04-29 18:55:08
101.71.129.239 attackbotsspam
Invalid user jian from 101.71.129.239 port 6812
2020-04-29 19:22:29
49.232.132.10 attack
detected by Fail2Ban
2020-04-29 19:19:42
5.40.162.155 attackspam
Automatic report - Port Scan Attack
2020-04-29 19:03:58
51.144.84.163 attackbots
(smtpauth) Failed SMTP AUTH login from 51.144.84.163 (NL/Netherlands/-): 5 in the last 3600 secs
2020-04-29 19:26:42
118.25.63.170 attackbotsspam
Invalid user ubnt from 118.25.63.170 port 27755
2020-04-29 19:15:08
181.48.67.89 attackbotsspam
prod11
...
2020-04-29 19:08:48
82.148.92.114 attack
[Aegis] @ 2019-07-02 04:39:56  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2020-04-29 19:26:22
185.204.118.116 attackbotsspam
Apr 29 11:04:09 v22018086721571380 sshd[17051]: Failed password for invalid user dockeradmin from 185.204.118.116 port 47326 ssh2
2020-04-29 19:27:52
183.89.215.202 attackbots
'IP reached maximum auth failures for a one day block'
2020-04-29 19:14:37

Recently Reported IPs

12.216.19.71 12.236.147.10 12.38.3.246 12.4.113.105
217.194.185.126 12.4.210.38 12.4.27.129 12.42.131.214
12.42.203.63 12.42.208.132 12.43.152.159 12.43.214.111
12.43.214.213 128.14.211.14 12.71.198.242 12.8.73.24
12.9.177.13 12.96.188.6 12.96.67.40 12.96.87.117